Skip to main content

Packetsled

This Integration is part of the Packetsled Pack.#

Overview

Use this integration to access the PacketSled playbook and command query.

Employ incidents and artifacts from an investigation, or a full packet capture, based on the perspective of a user or a host.

Use either the playbook or the individual commands to get the level of detail necessary for your investigation.

This integration was integrated and tested with PacketSled v5.3.2 and earlier.


Use Cases

  • Extract incidents, files, or PCAP.
  • Extract metadata for a specific host.
  • Enumerate sensors.

Prerequisites

Make sure you have the following PacketSled information.

  • Username and password for credential access
  • Confirm firewall rules to enable access to PacketSled API

Configure PacketSled on Cortex XSOAR

  1. Navigate to Settings > Integrations > Servers & Services.
  2. Search for PacketSled.
  3. Click Add instance to create and configure a new integration instance.
    • Name: textual name for the integration instance
    • Server URL (https://<customer_id>.packetsled.com)
    • If you want to Cortex XSOAR incidents to be created automatically from this integration instance, click Fetch Incidents.
    • Credentials : PacketSled username
    • Password: PacketSled password
  4. Click Test to validate credentials and configuration.
  5. Click Done to install integration.

Commands

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

  1. Extract incidents: packetsled-get-incidents
  2. Enumerate sensors: packetsled-get-sensors
  3. Extract metadata for a specific host: packetsled-get-flows
  4. Extract files: packetsled-get-files
  5. Extract PCAP: packetsled-get-pcaps

Extract incidents: packetsled-get-incidents

Extracts all incidents that occurred from last time they were extracted.

Inputs
Parameter Description Required
start_time

Beginning of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to 1 hour ago)

Optional

stop_time

End of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to current time)

Optional

envid

Unique ID in PacketSled to identify a group of sensors that belong to a single customer (by default, all sensors are queried)

Optional

probe

Unique ID in an envid used to identify a single sensor (by default, all sensors are queried)

Optional

Raw Output
{  
   "name":"Source: Packetsled SENSOR: , ENTITY: ",
   "rawJSON":{  
      
   }
}

Enumerate sensors: packetsled-get-sensors

Enumerates all attached sensors.

-NO FURTHER INFORMATION-


Extract metadata for a specific host: packetsled-get-flows

Finds flow metadata based on the specified parameters. The flows are posted as JSON files to the War Room.

Command Example

!packetsled-get-flows entity=192.168.0.110 limit=10000

Inputs
Parameter Description Required
start_time

Beginning of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to 1 hour ago)

Optional

stop_time

End of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to current time)

Optional

envid

Unique ID in PacketSled to identify a group of sensors that belong to a single customer (by default, all sensors are queried)

Optional

probe

Unique ID in an envid used to identify a single sensor (by default, all sensors are queried)

Optional

entity

IP address

Optional

port Port Optional
geo Geographical code Optional
family Protocol family (enumeration value) Optional
proto Protocol (enumeration value) Optional

Extract files: packetsled-get-files

Finds file artifacts based on the specified parameters. The files are posted to the War Room.

Inputs
Parameter Description Required
start_time

Beginning of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to 1 hour ago)

Optional

stop_time

End of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to current time)

Optional

envid

Unique ID in PacketSled to identify a group of sensors that belong to a single customer (by default, all sensors are queried)

Optional

probe

Unique ID in an envid used to identify a single sensor (by default, all sensors are queried)

Optional

entity

IP address

Optional

port Port Optional
geo Geographical code Optional
family Protocol family (enumeration value) Optional
proto Protocol (enumeration value) Optional

Extract PCAP: packetsled-get-pcaps

Finds full packet capture files based on the specified parameters. The PCAP files are posted to the War Room.

Command Example

!packetsled-get-pcaps entity=192.168.0.110

Inputs
Parameter Description Required
start_time

Beginning of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to 1 hour ago)

Optional

stop_time

End of the time range to query, can be either epoch seconds or ISO formatted datetime (defaults to current time)

Optional

envid

Unique ID in PacketSled to identify a group of sensors that belong to a single customer (by default, all sensors are queried)

Optional

probe

Unique ID in an envid used to identify a single sensor (by default, all sensors are queried)

Optional

entity

IP address

Optional

port Port Optional
proto A protocol (enumeration value) Optional
### packetsled-sensors *** List the sensors attached to the packetsled platform. #### Base Command `packetsled-sensors` #### Input | **Argument Name** | **Description** | **Required** | | --- | --- | --- | #### Context Output | **Path** | **Type** | **Description** | | --- | --- | --- | | Packetsled.Sensors | unknown | The list of sensors | | Packetsled.Sensors.label | unknown | The label of the sensor | | Packetsled.Sensors.envid | unknown | The environment id of the sensor | | Packetsled.Sensors.probe | unknown | The probe number of the sensor | ### packetsled-get-events *** Get all of the events for a given uid #### Base Command `packetsled-get-events` #### Input | **Argument Name** | **Description** | **Required** | | --- | --- | --- | | uid | The uid to retrieve logs for. Use the _id attribute from a flow for this parameter value. | Required | | envid | The environment id of the probe to search. | Optional | | probe | The probe number of the probe to search. | Optional | #### Context Output | **Path** | **Type** | **Description** | | --- | --- | --- | | Packetsled.Events | unknown | Retrieve all logs for a single flow | | Packetsled.Events._id | unknown | The unique id of the Event | | Packetsled.Events.src_ip | unknown | The originator of the Events | | Packetsled.Events.dest_ip | unknown | The respondant of the Events |