02/28-10:00:01.123456  [**] [1:2010935:6] ET MALWARE Generic Trojan RAT [**] [Classification: A Network Trojan was Detected] [Priority: 1] {TCP} 10.0.0.5:54321 -> 192.168.1.100:80
02/28-10:00:02.234567  [**] [1:2024897:3] ET INFO Observed DNS Query to .cloud TLD [**] [Classification: Potentially Bad Traffic] [Priority: 3] {UDP} 10.0.0.10:53 -> 10.0.0.1:53
02/28-10:00:03.345678  [**] [1:2100498:12] GPL ATTACK_RESPONSE id check returned root [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 10.0.0.15:44123 -> 93.184.216.34:80
02/28-10:00:04.456789  [**] [1:2010935:7] ET MALWARE Generic Trojan RAT [**] [Classification: A Network Trojan was Detected] [Priority: 1] {TCP} 10.0.0.20:8080 -> 172.16.0.5:443
02/28-10:00:05.567890  [**] [1:2019876:1] ET SCAN Nmap Scripting Engine User-Agent [**] [Classification: Web Application Attack] [Priority: 2] {TCP} 10.0.0.25:61234 -> 192.168.1.200:80
this is a malformed snort line that doesnt match
02/28-10:00:07.789012  [**] [1:2010935:6] ET MALWARE Generic Trojan RAT [**] [Classification: A Network Trojan was Detected] [Priority: 1] {TCP} 10.0.0.35:55555 -> 192.168.2.50:80
02/28-10:00:08.890123  [**] [1:2024897:3] ET INFO Observed DNS Query to .cloud TLD [**] [Classification: Potentially Bad Traffic] [Priority: 3] {UDP} 10.0.0.40:12345 -> 10.0.0.1:53
02/28-10:00:09.901234  [**] [1:2030001:2] ET POLICY External IP Lookup [**] [Classification: Potential Corporate Privacy Violation] [Priority: 4] {TCP} 10.0.0.45:33333 -> 93.184.216.34:443
02/28-10:00:10.012345  [**] [1:2010935:6] ET MALWARE Generic Trojan RAT [**] [Classification: A Network Trojan was Detected] [Priority: 1] {TCP} 10.0.0.50:22222 -> 192.168.1.100:80
