You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This repository contains a Wireshark-based Network Traffic Analysis and Threat Detection Report for Vendmo Tech — a fictional South African fintech company. This is Project 2 in the Vendmo Tech cybersecurity portfolio series, and serves as a companion to the Security Audit & Risk Assessment Report.
The report simulates a real-world SOC Blue Team incident response scenario, analysing a 2.3GB packet capture file from a confirmed multi-stage attack. It covers all three core threat scenarios a Blue Team / SOC analyst encounters in the field:
Scenario
Detected
Severity
🦠 Malware C2 Beaconing
✅ Yes
CRITICAL
📤 Data Exfiltration
✅ Yes
CRITICAL
🔎 Port Scan / Network Recon
✅ Yes
HIGH
📁 Repository Contents
File
Description
VendmoTech_Network_Traffic_Analysis.docx
Full Wireshark analysis report (Word format)
README.md
This file
📚 What's Inside the Report
The report is structured across 10 sections and 2 appendices:
Section
Content
1. Executive Summary
Incident overview, key stats, POPIA breach notification status
2. Scope & Methodology
Capture environment, analysis phases, Wireshark filters used
3. Traffic Overview
Baseline protocol statistics, top suspicious external connections
4. Detailed Findings
8 findings with full technical analysis and filter commands
5. Packet Evidence Table
10 key packets with source, destination, flags, and severity
6. Attack Timeline
Chronological reconstruction of the full kill chain
7. IOCs
10 Indicators of Compromise (IPs, domains, hashes, behaviours)
8. MITRE ATT&CK Mapping
8 techniques mapped across 5 ATT&CK tactics
9. Recommendations
10 prioritised containment and remediation actions
Affected Host: Finance department workstation (192.168.1.45)
Data Breached: ~4,200 customer PII records
Detection Time: ~23 hours (significant gap — key learning point)
⚠️Disclaimer: Vendmo Tech is a fictional company. All IP addresses, packet data, and incidents are entirely simulated for educational and portfolio purposes. No real network was captured or analysed.
IOC extraction and threat intelligence correlation
MITRE ATT&CK framework mapping
SOC incident response documentation
POPIA breach notification awareness
Blue Team / Defensive security mindset
📄 Licence
This project is intended for educational and portfolio use. Feel free to reference or adapt it for your own cybersecurity learning.
Report Version: v1.0 — March 2026 | Vendmo Tech SOC / Blue Team
About
A Wireshark-based network traffic analysis simulating a live SOC incident at Vendmo Tech. Detects C2 beaconing, data exfiltration & port scanning across a 2.3GB PCAP. Includes 8 findings, 10 IOCs, MITRE ATT&CK v14 mapping & attack timeline. Blue Team / SOC portfolio project.