Skip to content

splunk-soar-connectors/netwitness

Repository files navigation

NetWitness Logs and Packets

Publisher: Splunk Community
Connector Version: 3.0.0
Product Vendor: RSA
Product Name: NetWitness Logs and Packets
Product Version Supported (regex): ".*"
Minimum Product Version: 6.2.2

This app supports investigative actions to collect log and packet captures from RSA NetWitness Logs and Packets

The app uses HTTP/ HTTPS protocol for communicating with the Netwitness server. Below are the default ports used by Splunk SOAR.

        Service Name Transport Protocol Port
        http tcp 80
        https tcp 443

Configuration Variables

The below configuration variables are required for this Connector to operate. These variables are specified when configuring a NetWitness Logs and Packets asset in SOAR.

VARIABLE REQUIRED TYPE DESCRIPTION
url required string URL
verify_server_cert optional boolean Verify server certificate
username required string Username
password required password Password

Supported Actions

test connectivity - Validate the credentials provided for connectivity
get pcap - Download a packet capture file from Netwitness Logs and Packets and add it to the vault
get log - Download a log capture file from Netwitness Logs and Packets and add it to the vault
upload file - Upload a feed or parser file to a NetWitness Decoder
restart device - Restart the configured device

action: 'test connectivity'

Validate the credentials provided for connectivity

Type: test
Read only: True

Action Parameters

No parameters are required for this action

Action Output

No Output

action: 'get pcap'

Download a packet capture file from Netwitness Logs and Packets and add it to the vault

Type: investigate
Read only: True

There are several ways to search NetWitness Logs and Packets to get capture files:

  • By session ID, which can be done in three ways:
    • Searching by a single session ID. The downloaded capture file would have the name netwitness-<id>.
    • Searching by a list of session IDs. In this case the session_ids parameter should be a comma separated list. The downloaded capture file would have the name netwitness-<id1_id2_id3...>. The session ID list will be cut off at 50 characters.
    • Searching by a range of session IDs. In this case the session_ids parameter would have the format start_id-end_id. The downloaded capture file would have the name netwitness-<start_id>-<end_id>. NOTE: Including spaces when specifying a range of sessions IDs will cause the action to fail.
  • By query. The query parameter should be treated as the where clause of a database query using the meta keys configured on the NetWitness server. The downloaded capture file would have the name netwitness-<random_uuid>. Some example queries:
    • ip.src=10.10.10.10
    • ip.dst=10.10.0.1 || ip.dst=10.10.0.2
    • ip.src=10.10.0.7 && ip.dst=10.10.0.8
    • ip.src exists
  • By time frame, which requires both the start_time and end_time parameters be given. The downloaded capture file would have the name netwitness-<start_time>_<end_time>.
NOTE: If start_time and end_time are included along with a query, then the time-frame will be appended to the end of the query. For example: if the query is ip.src=10.10.10.10, the start time is 2018-01-01 00:00:00, and the end time is 2018-01-01 23:59:59, then the final query would be ip.src=10.10.0.7 && time="2018-01-01 00:00:00"-"2018-01-01 23:59:59"

file_name is an optional parameter that, if specified, will result in the capture file being given that name. It will override the filenames mentioned above. The appropriate extension, .pcap (or .json for get log), will be appended to the file name if it is not already present.

If a query returns no data, the action will pass, but no file will be added to the vault. Queries to decoders that return large amounts of data, which take more than five minutes, can time out, in which case the action will fail.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
session_ids optional Session IDs in a list (72,637,1298...), as a range (0-9999), or singly (485) string netwitness session ids
query optional A where query using configured meta keys string
start_time optional Start time in UTC (YYYY-MM-DD HH:MM:SS) string
end_time optional End time in UTC (YYYY-MM-DD HH:MM:SS) string
file_name optional File name to give the downloaded capture string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.end_time string
action_result.parameter.file_name string
action_result.parameter.query string
action_result.parameter.session_ids string netwitness session ids
action_result.parameter.start_time string
action_result.data.*.file_name string file name
action_result.data.*.size numeric
action_result.data.*.type string
action_result.data.*.vault_id string vault id
action_result.summary.file_availability boolean False True
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'get log'

Download a log capture file from Netwitness Logs and Packets and add it to the vault

Type: investigate
Read only: True

See get pcap for further information on this action.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
session_ids optional Session IDs in a list (72,637,1298...), as a range (0-9999), or singly (485) string netwitness session ids
query optional A where query using configured meta keys string
start_time optional Start time in UTC (YYYY-MM-DD HH:MM:SS) string
end_time optional End time in UTC (YYYY-MM-DD HH:MM:SS) string
file_name optional File name to give the downloaded capture string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.end_time string
action_result.parameter.file_name string
action_result.parameter.query string
action_result.parameter.session_ids string netwitness session ids
action_result.parameter.start_time string
action_result.data.*.file_name string file name
action_result.data.*.size numeric
action_result.data.*.type string
action_result.data.*.vault_id string vault id
action_result.summary.file_availability boolean False True
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'upload file'

Upload a feed or parser file to a NetWitness Decoder

Type: generic
Read only: False

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
vault_id required Vault ID of parser/feed to upload string vault id

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.parameter.vault_id string vault id
action_result.data string
action_result.summary string
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'restart device'

Restart the configured device

Type: generic
Read only: False

Action Parameters

No parameters are required for this action

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.status string success failed
action_result.data string
action_result.summary string
action_result.message string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1