Mentioned TCPDUMP:
2016-11-01 13:15:34.129681 IP 10.10.10.10.33672 > 10.1.1.1.443: Flags [S], seq 629635135, win 5840, options [mss 1460,sackOK,TS val 528901005 ecr 0,nop,wscale 7], length 0
2016-11-01 13:15:34.129707 IP 10.1.1.1.443 > 10.10.10.10.33672: Flags [S.], seq 2779043284, ack 629635136, win 14480, options [mss 1460,sackOK,TS val 2033090823 ecr 528901005,nop,wscale 7], length 0
2016-11-01 13:15:34.143747 IP 10.10.10.10.33672 > 10.1.1.1.443: Flags [.], ack 1, win 46, options [nop,nop,TS val 528901016 ecr 2033090823], length 0
2016-11-01 13:15:34.152022 IP 10.10.10.10.33672 > 10.1.1.1.443: Flags [P.], seq 1:106, ack 1, win 46, options [nop,nop,TS val 528901025 ecr 2033090823], length 105
2016-11-01 13:15:34.152039 IP 10.1.1.1.443 > 10.10.10.10.33672: Flags [.], ack 106, win 114, options [nop,nop,TS val 2033090845 ecr 528901025], length 0
2016-11-01 13:16:04.130234 IP 10.10.10.10.33672 > 10.1.1.1.443: Flags [F.], seq 106, ack 1, win 46, options [nop,nop,TS val 528931002 ecr 2033090845], length 0
2016-11-01 13:16:04.169465 IP 10.1.1.1.443 > 10.10.10.10.33672: Flags [.], ack 107, win 114, options [nop,nop,TS val 2033120863 ecr 528931002], length 0
And the corresponding output from SSLDump:
New TCP connection 1: 10.10.10.10(33672) <-> 10.1.1.1(443)
1 1 0.0223 (0.0223) C>S SSLv2 compatible client hello
Version 3.1
cipher suites
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_DES_CBC_SHA
TLS_DHE_DSS_WITH_DES_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
1 30.0005 (29.9782) C>S TCP FIN