tftp
These signatures are based on TFTP traffic. These include malicious files that are distrubted via TFTP. The last two signatures refer to generic GET and PUT via TFTP, which is generally frowned upon on most networks, but may be used in some enviornments