I had a similar scenario this morning this time for a Backdoor.Win32.Ghost.E ABOT protection. Per the log card the source is external and the destination is my organizations public IP 4.30.x.x which of course is on a external interface.
Basically from the source and destination in the log card this looks like external traffic coming into my organization.
This time I was able to download a pcap from the Forensic Details:
It appears there was a NAT translation as the 172.19.x.x IP is a host object of mine that has a static NAT in it for the 4.30.x.x IP.
Is the "offending packet" the first one listed in the PCAP that caused the ABOT log? If it is this shows the traffic did indeed originate from the public internet and came into a external interface.
With that being said the PCAP does show my 172.19.x.x IP replying to the alleged malicious host so is packet # 2 the offending packet?