MISP

Integration version: 31.0

Configure MISP Integration to work with Google Security Operations

Configure MISP integration with a CA certificate

You can verify your connection with a CA certificate file if needed.

Before you start, ensure you have the following:

  • The CA certificate file
  • The latest MISP integration version

To configure the integration with a CA certificate, complete the following steps:

  1. Parse your CA certificate file into a Base64 String.
  2. Open the integration configuration parameters page.
  3. Insert the string in theCA Certificate File field.
  4. To test that the integration is successfully configured, select theVerifySSL checkbox and clickTest.

Automation Key

The authentication is performed via a secure key available in the MISP UI. TheAPI key is available in the event actions menu under automation.

Note: For detailed information on MISP API automation, seeAutomation API.

Configure MISP integration in Google SecOps

For detailed instructions on how to configure an integration inGoogle SecOps, seeConfigureintegrations.

Integration parameters

Use the following parameters to configure the integration:

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Instance NameStringN/ANoName of the Instance you intend to configure integration for.
DescriptionStringN/ANoDescription of the Instance.
API Roothttps://<IP>YesAddress of the MISP instance.
API KeyStringN/AYesGenerated in MISP's console.
Use SSLCheckboxUncheckedNoUse this checkbox, if your MISP connection requires an SSL verification (unchecked by default).
Run RemotelyCheckboxUncheckedNoCheck the field in order to run the configured integration remotely. Once checked, the option appears to select the remote user (agent).
Note: You can make changes at a later stage if needed. Once configured, theInstances can be used in Playbooks. For detailed information on configuring andsupporting multiple instances, please seeSupporting multiple instances.

Actions

Add Attribute

Description

Add an entity as an attribute to a MISP event.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesThe ID of the event.
CategoryStringExternal analysisNoThe category of the attribute. Default: External analysis.
DistributionString1NoThe distribution of the attribute. Default: 1.
For Intrusion Detection SystemCheckboxUncheckedNoWhether the attribute is used for Intrusion Detection System. Default: false.
CommentStringN/ANoThe comment to add to the attribute.

Use cases

N/A

Run On

This action runs on the following entities:

  • URL
  • Hostname
  • IP Address
  • Filehash

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
successTrue/Falsesuccess:False
JSON Result
N/A

Create Event

Description

Create a new MISP event.

Known Limitation

Currently, MISP API doesn't allow event to be immediately published uponcreation. You need to first create an event and then use action "Publish Event".

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event NameStringN/AYesThe name of the event.
Threat LevelString0NoThe threat level of the event. Default: 0.
DistributionString1NoThe distribution of the attribute. Default: 1.
AnalysisString0NoThe analysis level of the event [0-2]: Default: 0.
PublishCheckboxCheckedNoWhether to publish the event or not.
CommentStringN/ANoThe comment of the event.

Run On

This action runs on all entities.

Action Results

Script Result
Script Result NameValue OptionsExample
event_idN/AN/A

Add Tag to an Event

Description

Add a tag to an event action allows a user to add a tag to a specific event inMISP. This adds a classification to the event based on the category of thesecurity threat posed by the IOC associated with the event.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesThe unique identifier specifying the event to add tag to.
Tag NameStringN/AYesThe name of the tag to add to an event.

Use cases

Classify an event: Update the event through adding a tag.

Run On

This action runs on all entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"saved":true,"success":"Tag(s) added.","check_publish":true}]

Download File

Description

Download files related to event in MISP.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/ANoSpecify the ID or UUID of the event from which you want to download files
Download Folder PathStringN/A

Specify the absolute path to the folder, which should store files. If nothing is specified, action will create an attachment instead.
Note: JSON result is only available, when you provide proper value for this parameter.

OverwriteCheckboxUncheckedIf enabled, action will overwrite existing files.

Run On

This action runs on the Filehash entity.

Action Results
Script Result
Script Result NameValue OptionsExample
successTrue/Falsesuccess:False
JSON Result
{"absolute_paths":["/etc/file1.txt","/etc/file2.txt"]}
Case Wall
Result TypeValue DescriptionType
Output message*

If success: "Successfully downloaded the following files from the event with {0} {1} in MISP:\n{2}".format(ID/UUID, event_id, result/filename from the response)

if no files were found: "No files were found for the event with {0} {1} in MISP:\n{2}".format(ID/UUID, event_id)

if "Download Folder Path" is not specified and some of the files exceeded platform limit for attachments: "Action wasn't able to download the following files, because they exceeded the limit of 3 MB: \n {0}. \n Please specify a folder path in the parameter "Download Folder Path" in order to download them.".(result/filename)

Critical Error (fail action) "Error executing action "Download File". Reason: {0}".format(stacktrace)

Event ID is not found (fail action) "Error executing action "Download File". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

If overwrite is false and one of the files already exists: "Error executing action "Download File". Reason: The following files already exist: {0}. Please remove them or set parameter "Overwrite" to true.".format(absolute path to the file)

General

Enrich Entities

Description

Enrich entities based on the attributes in MISP.

Parameters

Parameter Display NameTypeDefault ValueDescription
Number of attributes to returnStringN/ASpecify how many attributes to return for entities.
Filtering conditionSpecify the filtering condition for the action. If "Last" is selected, action will use the oldest attribute for enrichment, if "First" is selected, action will use the newest attribute for enrichment.
Threat Level ThresholdDDL

Low

Possible Values:

High

Medium

Low

Undefined

Specify what should be the threshold for the threat level of the event, where the entity was found. If related event exceeds or matches threshold, entity will be marked as suspicious.
Attribute Search LimitInteger50Specify how many attributes to search for per entity. This parameter has an impact on which attribute will be selected for enrichment. Default: 50.

Run On

This action runs on the following entities:

  • URL
  • Hostname
  • IP Address
  • Filehash
Action Results
Entity Enrichment

Entities are marked as suspicious if the threat level of the event exceeds 0.Otherwise: False

Script Result
Script Result NameValue OptionsExample
successTrue/Falsesuccess:False
JSON Result
[{"EntityResult":[{"Event":{"orgc_id":"1","ShadowAttribute":[],"id":"3","threat_level_id":"3","event_creator_email":"john_doe@example.com","uuid":"5c5bff1b-a414-4a83-8755-035f0a000016","Object":[],"Orgc":{"uuid":"5c5ac66e-3884-4031-afd7-46f5bb9ebcaa","name":"ORGNAME","id":"1"},"Org":{"uuid":"5c5ac66e-3884-4031-afd7-46f5bb9ebcaa","name":"ORGNAME","id":"1"},"RelatedEvent":[],"sharing_group_id":"0","timestamp":"1549533154","date":"2019-02-07","disable_correlation":"False","info":"Test event","locked":"False","publish_timestamp":"1549533214","Attribute":[{"category":"Network activity","comment":" ","uuid":"5c5bffe2-9298-4098-ae31-035d0a000016","deleted":"False","timestamp":"1549533154","to_ids":"False","distribution":"3","object_id":"0","event_id":"3","ShadowAttribute":[],"sharing_group_id":"0","value":"1.1.1.1","disable_correlation":"False","object_relation":"None","type":"ip-src","id":"1","Galaxy":[]}],"attribute_count":"1","org_id":"1","analysis":"2","extends_uuid":" ","published":"True","distribution":"3","proposal_email_lock":"False","Galaxy":[]}}],"Entity":"1.1.1.1"}]
Case Wall
Result TypeValue DescriptionType
Output message*

For attributes that were found: (is_success=true) "Successfully enriched the following entities using MISP: \n{0}".format(entity.identifier)

For attributes that were not found (is_success=true) "Action wasn't able to enrich the following entities using MISP: \n{0}".format(entity.identifier)

If all attributes were not found (is_success=false) "No entities were enriched using MISP"

If attributes are suspicious (is_success=true) "The following attributes were marked as suspicious using MISP: \n {0}".format(entity.identifier)

General
CSV Table

Table Columns:

  • ID
  • Event ID
  • Category
  • Type
  • UUID
  • Timestamp
  • Distribution
  • IDS

Get Related Events

Description

Retrieve information about events that are related to entities in MISP.

Parameters

Parameter Display NameTypeDefault ValueDescription
Mark As SuspiciousCheckboxCheckedIf enabled, action will mark entity as suspicious, if there is at least one related event to it.

Run On

This action runs on the following entities:

  • URL
  • Hostname
  • IP Address
  • Filehash

Action Results

Entity Enrichment

If records of related events are available, then entities are marked assuspicious. otherwise: False.

Enrichment Field NameLogic - When to apply
EventReturns if it exists in JSON result
Script Result
Script Result NameValue OptionsExample
successTrue/Falsesuccess:False
JSON Result
[{"EntityResult":[{"Event":{"orgc_id":"1","ShadowAttribute":[],"id":"3","threat_level_id":"3","event_creator_email":"john_doe@example.com","uuid":"5c5bff1b-a414-4a83-8755-035f0a000016","Object":[],"Orgc":{"uuid":"5c5ac66e-3884-4031-afd7-46f5bb9ebcaa","name":"ORGNAME","id":"1"},"Org":{"uuid":"5c5ac66e-3884-4031-afd7-46f5bb9ebcaa","name":"ORGNAME","id":"1"},"RelatedEvent":[],"sharing_group_id":"0","timestamp":"1549533154","date":"2019-02-07","disable_correlation":"False","info":"Test event","locked":"False","publish_timestamp":"1549533214","Attribute":[{"category":"Network activity","comment":" ","uuid":"5c5bffe2-9298-4098-ae31-035d0a000016","deleted":"False","timestamp":"1549533154","to_ids":"False","distribution":"3","object_id":"0","event_id":"3","ShadowAttribute":[],"sharing_group_id":"0","value":"1.1.1.1","disable_correlation":"False","object_relation":"None","type":"ip-src","id":"1","Galaxy":[]}],"attribute_count":"1","org_id":"1","analysis":"2","extends_uuid":" ","published":"True","distribution":"3","proposal_email_lock":"False","Galaxy":[]}}],"Entity":"1.1.1.1"}]
Case Wall
Result TypeValue DescriptionType
Output message*

If one event found for at least one entity: "Successfully retrieved information about the related events for the following entities: \n{0}".format(entity.identifier)

If no event found for at least one entity: "Action wasn't able to retrieve information about the related events for the following entities: \n{0}".format(entity.identifier

If no events for all: "No related events were found for the provided entities."

General

Upload File

Description

Upload a file to a MISP event.

Parameters

NameTypeDefaultDescription
Event IDStringN/ASpecify the ID or UUID of the event to which you want to upload this file.
File PathStringN/ASpecify a comma-separated list of absolute filepaths of the files that you want to upload to MISP.
CategorySpecify the category for the uploaded file. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation.
DistributionStringCommunity

Specify the distribution for the uploaded file.
Possible values: 0 - Organisation, 1 - Community, 2 - Connected, 3 - All. You can either provide a number or a string.

Threat LevelStringHigh

Specify the threat level for the uploaded file.
Possible values: 1 - High, 2 - Medium, 3 - Low, 4 - Undefined. You can either provide a number or a string.

AnalysisStringInitial

Specify the analysis of the event.
Possible values: 0 - Initial, 1 - Ongoing, 2 - Completed. You can either provide a number or a string.

InfoStringN/ASpecify additional info for the uploaded file.
For Intrusion Detection SystemCheckboxUncheckedIf enabled, uploaded file will be used for intrusion detection systems.
CommentStringN/ASpecify additional comments related to the uploaded file.
Action Results
Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
{"Event":{"id":"106","orgc_id":"1","org_id":"1","date":"2021-01-15","threat_level_id":"1","info":"vanuhi 1015","published":false,"uuid":"1cd22aa2-57e8-4fc8-bac6-721c1be2c27d","attribute_count":"10","analysis":"0","timestamp":"1610893968","distribution":"1","proposal_email_lock":false,"locked":false,"publish_timestamp":"0","sharing_group_id":"0","disable_correlation":false,"extends_uuid":"","event_creator_email":"admin@admin.test","Org":{"id":"1","name":"ORGNAME","uuid":"09b0dde1-2934-4310-a107-74b6f534f041","local":true},"Orgc":{"id":"1","name":"ORGNAME","uuid":"09b0dde1-2934-4310-a107-74b6f534f041","local":true},"Attribute":[],"ShadowAttribute":[],"Object":[{"id":"446","name":"file","meta-category":"file","description":"File object describing a file with meta-information","template_uuid":"688c46fb-5edb-40a3-8273-1af7923e2215","template_version":"20","event_id":"106","uuid":"0188ba5d-68eb-4b5c-8e05-6fd49f8eee9a","timestamp":"1610691647","distribution":"1","sharing_group_id":"0","comment":"","deleted":false,"first_seen":null,"last_seen":null,"ObjectReference":[],"Attribute":[{"id":"1859","type":"malware-sample","category":"External analysis","to_ids":true,"uuid":"7920cd28-5082-47ce-9c3e-3ccbd5dae138","event_id":"106","distribution":"1","timestamp":"1610703650","comment":"","sharing_group_id":"0","deleted":false,"disable_correlation":false,"object_id":"446","object_relation":"malware-sample","first_seen":null,"last_seen":null,"value":"vanuhi.txt|7bd55b0a276e076cbaf470e64359adb8","Galaxy":[],"data":"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","ShadowAttribute":[],"Sighting":[{"id":"1733","attribute_id":"1859","event_id":"106","org_id":"1","date_sighting":"1611207638","uuid":"feb085f1-1923-4327-a73d-b60a948377e4","source":"","type":"0","Organisation":{"id":"1","uuid":"09b0dde1-2934-4310-a107-74b6f534f041","name":"ORGNAME"},"attribute_uuid":"7920cd28-5082-47ce-9c3e-3ccbd5dae138"}]}}}}
Case Wall
Result typeValue/DescriptionType
Output message*

If successful for one entity:"Succesfully uploaded the provided files to the event {0} in MISP".format(event_id)

Critical Error (fail action) "Error executing action "Upload File". Reason: {0}".format(stacktrace)

If invalid parameter is specified in "Distribution"(fail action):

"Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Distribution". Acceptable numbers: 0,1,2,3. Acceptable strings: Organisation, Community, Connected, All".

If invalid parameter is specified in "Threat Level" (fail action): "Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Threat Level". Acceptable numbers: 1,2,3,4. Acceptable strings: High, Medium, Low, Undefined".

If invalid parameter is specified in "Category" (fail action): "Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation".

If invalid parameter is specified in "Analysis" (fail action): "Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Analysis". Acceptable numbers: 0,1,2. Acceptable strings: Initial, Ongoing, Completed".

if at least one of the files is not available "Error executing action "Upload File". Reason: the following files were not accessible: \n {0}".format(file paths, that were not accessible.)

Event ID is not found (fail action) "Error executing action "Upload File". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Ping

Description

Test Connectivity.

Parameters

N/A

Use cases

N/A

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
successTrue/Falsesuccess:False
JSON Result
N/A

Remove Tag From an Event

Description

Remove tags from event in MISP.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesSpecify the ID or UUID of the event, from which you want to remove tags.
Tag NameCSVN/AYesSpecify a comma-separated list of tags that you want to remove from events.

Use cases

Re-classify event: Remove tag for reclassification.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"saved":true,"success":"Tag removed.","check_publish":true}]
Case Wall
Result typeValue/DescriptionType
Output message*

If successfully removed all tag from an event: "Successfully removed the following tags from the event with {0} {1} in MISP: {2}.".format(ID/UUID, event_id, tags)

If not successfully removed some tags from an event: "Action wasn't able to remove the following tags from the event with {0} {1} in MISP: {2}.".format(ID/UUID, event_id, tags)

If not successful for all: "No tags were removed from the event with {0} {1} in MISP".format(ID/UUID, event_id)

If at least one tag was not found: "The following tags were not found in MISP: \n{0}".format(list of tags that were not found in MISP)

If all tags were not found: "None of the provided tags were found in MISP."

Critical Error (fail action) "Error executing action "Remove Tag from an Event". Reason: {0}".format(stacktrace)

Event ID is not found (fail action) "Error executing action "Remove Tag from an Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Add Tag to an Attribute

Description

This action allows a user to add a tag to a specific attribute in MISP. Thisadds a classification to the attribute based on the category of a securitythreat posed by the IOC in the attribute.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDIntegerN/AYesThe identifier of the event that the attribute is associated with. Example: 1.
Tag NameStringN/AYesThe name of the tag to add to an attribute.
Attribute NameStringN/AYesThe name identifier of the attribute to tag.
CategoryStringN/AYesThe category which the attribute belongs to. e.g. Payload Delivery.
TypeStringN/AYesThe type of the attribute. e.g. filename.
Object UUIDStringN/ANoThe unique identifier for an object in the event.

Use cases

Classify attribute based on IOC type: Add tag to attribute.

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"name":"Global tag unique___test(7) successfully attached to Attribute(9).","message":"Global tag unique___test(7) successfully attached to Attribute(9).","url":"/tags/attachTagToObject"}]

Remove Tag From an Attribute

Description

Remove tags from attributes in MISP.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/ANoSpecify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event".
Tag NameCSVN/AYesSpecify a comma-separated list of tags that you want to remove from attributes.
Attribute NameCSVN/ANo

Specify a comma-separated list of attribute identifiers from which you want to remove tags.
Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.

CategoryCSVN/ANo

Specify a comma-separated list of categories. If specified, action will only remove tags from attributes that have matching category. If nothing is specified, action will ignore categories in attributes.
Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation.

TypeCSVN/ANo

Specify a comma-separated list of attribute types. If specified, action will only remove tags from attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes.
Example values: md5, sha1, ip-src, ip-dst

Object UUIDCSVN/ASpecify the UUID of the object that contains the desired attribute.
Attribute SearchDDL

Provided Event

Possible values:

All Events

Provided Event

YesSpecify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and remove tags from all attributes that match our criteria.
Attribute UUIDCSVSpecify a comma-separated list of attribute UUIDs from which you want to remove new tags. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.

Use cases

Re-classify attribute: Remove tag for reclassification

Run On

This action runs on all entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"name":"Tag unique___test(7) successfully removed from Attribute(9).","message":"Tag unique___test(7) successfully removed from Attribute(9).","url":"/tags/removeTagFromObject"}]
Case Wall
Result typeValue/DescriptionType>
Output message*

If successfully removed tags from at least one attribute: "Successfully removed tags from the following attributes in MISP:\n{0}".format(attribute name/object UUID)

if not successfully removed tags from at least one attribute: "Action didn't removed tags from the following attributes in MISP:\n{0}".format(attribute name/object UUID)

If not successful for all: "No tags were removed from the provided attributes in MISP"

If at least one tag was not found: "The following tags were not found in MISP: \n{0}".format(list of tags that were not found in MISP)

If all tags were not found: "None of the provided tags were found in MISP."

Critical Error (fail action) "Error executing action "Remove Tag from an Attribute". Reason: {0}".format(stacktrace)

If invalid parameter is specified in "Category" (fail action): "Error executing action "Remove Tag from an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation".

If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Remove Tag from an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"".

Event ID is not found (fail action) "Error executing action "Remove Tag from an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Publish Event

Description

The action allows the user to publish an event. Publishing an event shares it tothe sharing group selected, making it visible to all members.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesSpecify the ID or UUID of the event that you want to publish.

Use cases

Publish an event:

  1. Create even
  2. Add event attributes
  3. Publish event

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"Event":{"id":"3","orgc_id":"1","org_id":"1","date":"2019-12-27","threat_level_id":"1","info":"Connection to .ch","published":true,"uuid":"5e05dd29-7b90-474d-b5f6-51ae0a00024b","attribute_count":"0","analysis":"1","timestamp":"1577774920","distribution":"3","proposal_email_lock":false,"locked":false,"publish_timestamp":"1577774846","sharing_group_id":"0","disable_correlation":false,"extends_uuid":"5e05db24-1e98-4bb9-bd56-51fd0a00024b","event_creator_email":"admin@admin.test","Org":{"id":"1","name":"ORGNAME","uuid":"5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef","local":true},"Orgc":{"id":"1","name":"ORGNAME","uuid":"5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef","local":true},"Attribute":[],"ShadowAttribute":[],"RelatedEvent":[],"Galaxy":[],"Object":[],"Tag":[{"id":"7","name":"unique___test","colour":"#9648c4","exportable":true,"user_id":"0","hide_tag":false,"numerical_value":null,"local":0}]}}]
Case Wall
Result typeValue/DescriptionType
Output message*

If successful: "Successfully published event with {0} {1} in MISP.".format(ID/UUID, event_id)

If not successful: "Event with {0} {1} was not published in MISP".format(ID/UUID, event_id)

Critical Error (fail action) "Error executing action "Publish Event". Reason: {0}".format(stacktrace)

Event ID is not found (fail action) "Error executing action "Publish Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Unpublish Event

Description

The action allows the user to unpublish an event. Unpublishing an event preventsit from being visible to the shared groups.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesSpecify the ID or UUID of the event that you want to unpublish.
Action Results
Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"Event":{"id":"3","orgc_id":"1","org_id":"1","date":"2019-12-27","threat_level_id":"1","info":"Connection to .ch","published":false,"uuid":"5e05dd29-7b90-474d-b5f6-51ae0a00024b","attribute_count":"0","analysis":"1","timestamp":"1577774920","distribution":"3","proposal_email_lock":false,"locked":false,"publish_timestamp":"1577774846","sharing_group_id":"0","disable_correlation":false,"extends_uuid":"5e05db24-1e98-4bb9-bd56-51fd0a00024b","event_creator_email":"admin@admin.test","Org":{"id":"1","name":"ORGNAME","uuid":"5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef","local":true},"Orgc":{"id":"1","name":"ORGNAME","uuid":"5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef","local":true},"Attribute":[],"ShadowAttribute":[],"RelatedEvent":[],"Galaxy":[],"Object":[],"Tag":[{"id":"7","name":"unique___test","colour":"#9648c4","exportable":true,"user_id":"0","hide_tag":false,"numerical_value":null,"local":0}]}}]
Case Wall
Result typeValue/DescriptionType
Output message*

If successful: "Successfully unpublished event with {0} {1} in MISP.".format(ID/UUID, event_id)

If not successful: "Event with {0} {1} was not unpublished in MISP".format(ID/UUID, event_id)

Critical Error (fail action) "Error executing action "Unpublish Event". Reason: {0}".format(stacktrace)

Event ID is not found (fail action) "Error executing action "Unpublish Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Delete an Attribute

Description

Delete attributes in MISP. Supported hashes: MD5, SHA1, SHA224, SHA256, SHA384,SHA512, SSDeep.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/ANoSpecify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event".
Attribute NameCSVN/ANo

Specify a comma-separated list of attribute identifiers that you want to delete.
Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.

CategoryCSVN/ANo

Specify a comma-separated list of categories. If specified, action will only delete attributes that have matching category. If nothing is specified, action will ignore categories in attributes.
Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation.

TypeCSVN/ANo

Specify a comma-separated list of attribute types. If specified, action will only delete attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes.
Example values: md5, sha1, ip-src, ip-dst

Object UUIDStringN/ANoThe unique identifier for an object in the event.
Attribute SearchDDL

Provided Event

Possible values:

All Events

Provided Event

YesSpecify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and delete all attributes that match our criteria.
Attribute UUIDCSV

Specify a comma-separated list of attribute UUIDs that you want to delete.
Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.

Use cases

Remove an attribute from an event.

Run On

This action runs on all entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"message":"Attribute deleted."}]
Case Wall
Result TypeValue DescriptionType
Output message*

If successfully added Sighting to at least one attribute: "Successfully deleted the following attributes in MISP:\n{0}".format(attribute name/object UUID)

if not successfully added Sighting to at least one attribute: "Action didn't delete the following attributes in MISP:\n{0}".format(attribute name/object UUID)

If not successful for all: "No attributes were deleted in MISP"

Critical Error (fail action) "Error executing action "Delete an Attribute". Reason: {0}".format(stacktrace)

If invalid parameter is specified in "Category" (fail action): "Error executing action "Delete an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation".

If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Delete an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"".

Event ID is not found (fail action) "Error executing action "Delete an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Delete an Event

Description

Delete event in MISP.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesSpecify the ID or UUID of the event that you want to delete.

Use cases

Delete an event permanently.

Run On

This action runs on the User entity.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
[{"name":"Event deleted.","message":"Event deleted.","url":"/events/delete/4"}]
Case Wall
Result TypeValue DescriptionType
Output message*

If successful: "Successfully deleted event with {0} {1} in MISP".format(ID/UUID, event_id)

Critical Error (fail action) "Error executing action "Delete an Event". Reason: {0}".format(traceback)

Event ID is not found (fail action) "Error executing action "Delete an Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Create File Misp Object

Description

The action allows the user to organize file attributes related to an event in asingle object which describes a file with its meta-information. The object withthe attributes is then attached to a specified event.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesThe unique identifier of the event to add the object. Example: 1
FilenameStringN/ANoThe filename of the file.
MD5StringN/ANoThe md5 hash value of the file.
SHA1StringN/ANoThe sha1 hash value of the file.
SHA256StringN/ANoThe sha256 hash value of the file.
SSDEEPStringN/ANoThe ssdeep value of the file Example: 96:p5aAS1tN0M3t9AnTNuG6TNOt5PR1TNZdkljOXTNSnKTF3X7KsTFW+kLtW6K8i7bI:p5mb4rgQhRp7GljCbF3LKqFjkwxtU
ImphashStringN/ANoThe MD5 hash value calculated from the imported table.

Use cases

N/A

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
N/A

Create IP-Port Misp Object

Description

The action allows the user to organize IP-port attributes related to an event ina single object which describes an IP address (or domain or hostname) and a portseen as a tuple (or as a triple) in a specific time frame . The object with theattributes is then attached to a specified event.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesThe unique identifier of the event to add the object. Example: 1
Dst-portStringN/ANoDestination port.
Src-portStringN/ANoSource port.
DomainStringN/ANoDomain.
HostnameStringN/ANoHostname.
IP-SrcStringN/ANoSource IP Address.
IP-DstStringN/ANoDestination IP Address.

Use cases

N/A

Run On

This action runs on all entities.

Action Results

Entity Enrichment

N/A

Insights

N/A

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
N/A

Create network-connection Misp Object

Description

Create a network-connection Object in MISP. Requires one of the following:Dst-port, Src-port, IP-Src, IP-Dst to be provided or "Use Entities" parameterset to true.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesSpecify the ID or UUID of the event to which you want to add network-connection objects.
Dst-portStringN/ANoSpecify the destination port, which you want to add to the event.
Src-portStringN/ANoSpecify the source port, which you want to add to the event.
Hostname-dstStringN/ANoSpecify the source destination, which you want to add to the event.
Hostname-srcStringN/ANoSpecify the source hostname, which you want to add to the event.
IP-SrcStringN/ANoSpecify the source IP, which you want to add to the event.
IP-DstStringN/ANoSpecify the destination IP, which you want to add to the event.
Layer3-protocolStringN/ANoSpecify the related layer 3 protocol, which you want to add to the event.
Layer4-protocolStringN/ANoSpecify the related layer 4 protocol, which you want to add to the event.
Layer7-protocolStringN/ANoSpecify the related layer 7 protocol, which you want to add to the event.
Use EntitiesCheckboxUncheckedNoIf enabled, action will use entities in order to create objects. Supported entities: IP Address. "Use Entities" has priority over other parameters.
IP TypeDDL

Source IP

Possible values:

Source IP

Destination IP

Specify what attribute type should be used with IP entities.

Run On

This action runs on all entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
N/A
Case Wall
Result TypeValue DescriptionType
Output message*

If success and "Use Entities" is not true: "Successfully created new network-connection object for event with {0} {1} in MISP.".format(ID/UUID, event_id)

If not success and "Use Entities" is not true: "Action wasn't able to created new network-connection object for event with {0} {1} in MISP. Reason: {2}".format(ID/UUID)

If success for one and "Use Entities" is true: "Successfully created new network-connection objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers)

If not success for one and "Use Entities" is true: "Action wasn't able to create new network-connection objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers)

If not success for all and "Use Entities" is true: "Action wasn't able to create new network-connection objects for event with {0} {1} in MISP based on the provided entities.".format(ID/UUID, event_id)

Critical Error (fail action) "Error executing action "Create network-connection Misp Object". Reason: {0}".format(stacktrace)

Event ID is not found (fail action) "Error executing action "Create network-connection Misp Object". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

If none of the Dst-port, Src-port, IP-Src, IP-Dst are provided and "Use Entities" == false: "Error executing action "Create network-connection Misp Object". Reason: One of the: "Dst-port", "Src-port", "IP-Src", "IP-Dst" should be provided or "Use Entities" parameter set to true".

General

Create Url Misp Object

Description

Create a URL Object in MISP. Requires "URL" to be provided or "Use Entities"parameter set to true.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesSpecify the ID or UUID of the event to which you want to add URL objects.
URLStringN/ANoSpecify the URL, which you want to add to the event.
PortStringN/ANoSpecify the port, which you want to add to the event.
First seenStringN/ANo

Specify, when the URL was first seen.
Format: 2020-12-22T13:07:32Z

Last seenStringN/ANo

Specify, when the URL was last seen.
Format: 2020-12-22T13:07:32Z

DomainStringN/ANoSpecify the domain, which you want to add to the event.
TextStringN/ANoSpecify the additional text, which you want to add to the event.
IPStringN/ANoSpecify the IP, which you want to add to the event.
HostStringN/ANoSpecify the Host, which you want to add to the event.
Use EntitiesCheckboxUncheckedIf enabled, action will use entities in order to create objects. Supported entities: URL. "Use Entities" has priority over other parameters.

Run On

This action runs on all entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
N/A
Case Wall
Result TypeValue DescriptionType
Output message*

If success and "Use Entities" is not true: "Successfully created new URL object for event with {0} {1} in MISP.".format(ID/UUID, event_id)

If not success and "Use Entities" is not true: "Action wasn't able to created URL object for event with {0} {1} in MISP. Reason: {2}".format(ID/UUID)

If success for one and "Use Entities" is true: "Successfully created new URL objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers)

If not success for one and "Use Entities" is true: "Action wasn't able to create new URL objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers)

If not success for all and "Use Entities" is true: "Action wasn't able to create new URL objects for event with {0} {1} in MISP based on the provided entities.".format(ID/UUID, event_id)

Critical Error (fail action) "Error executing action "Create Url Misp Object". Reason: {0}".format(stacktrace)

Event ID is not found (fail action) "Error executing action "Create Url Misp Object". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

If none of the URL are provided and "Use Entities" == false: "Error executing action "Create Url Misp Object". Reason: Either "URL" should be provided or "Use Entities" parameter set to true".

General

Create Virustotal-Report Object

Description

Create a Virustotal-Report Object in MISP.

Parameters

Parameter Display NameTypeDefault ValueIs MandatoryDescription
Event IDStringN/AYesSpecify the ID or UUID of the event to which you want to add URL objects.
PermalinkStringN/AYesSpecify the link to the VirusTotal report, which you want to add to the event.
CommentStringN/ANoSpecify the comment, which you want to add to the event.
Detection RatioStringN/ANoSpecify the detection ration, which you want to add to the event.
Community ScoreStringN/ANoSpecify the community score, which you want to add to the event.
First SubmissionStringN/ANo

Specify first submission of the event.
Format: 2020-12-22T13:07:32Z

Last SubmissionStringN/ANo

Specify last submission of the event.
Format: 2020-12-22T13:07:32Z

Run On

This action runs on all entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
Case Wall
Result TypeValue DescriptionType
Output message*

If success : "Successfully created new Virustotal-Report object for event with {0} {1} in MISP.".format(ID/UUID, event_id)

If not success : "Action wasn't able to created Virustotal-Report object for event with {0} {1} in MISP. Reason: {2}".format(ID/UUID)

Critical Error (fail action) "Error executing action "Create Virustotal-Report Misp Object". Reason: {0}".format(stacktrace)

Event ID is not found (fail action) "Error executing action "Create Virustotal-Report Misp Object". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

List Event Objects

Description

Retrieve information about available objects in MISP event.

Parameters

Parameter Display NameTypeDefault ValueIs mandatoryDescription
Event IDStringN/AYesSpecify a comma-separated list of IDs and UUIDs of the events, for which you want to retrieve details.
Max Objects to ReturnInteger50NoSpecify how many objects to return.

Run On

This action doesn't run on entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
JSON Result
"Object":[{"id":"1","name":"ftm-Associate","meta-category":"followthemoney","description":"Non-family association between two people","template_uuid":"6119ecb3-dedd-44b6-b88f-174585b0b1bf","template_version":"1","event_id":"1","uuid":"2a3e260f-d3b2-4164-b2b1-2f6f5b559970","timestamp":"1594632232","distribution":"5","sharing_group_id":"0","comment":"","deleted":false,"first_seen":null,"last_seen":null,"ObjectReference":[],},{"id":"2","name":"ftm-Associate","meta-category":"followthemoney","description":"Non-family association between two people","template_uuid":"6119ecb3-dedd-44b6-b88f-174585b0b1bf","template_version":"1","event_id":"1","uuid":"800d8634-175a-4bc2-a4d7-aca200c8c132","timestamp":"1594632463","distribution":"5","sharing_group_id":"0","comment":"","deleted":false,"first_seen":null,"last_seen":null,"ObjectReference":[],}
Case Wall
Result TypeValue DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If at least object found for 1 event: "Successfully listed objects for the following events: \n{0}".format(event_ids)

If event with specified id was not found (is_success = false):
print "Action was not able to list objects. Reason: Event with ID {0} was not found in MISP.".format(event_id)

If no object found for 1 event:

"Action wasn't able to find objects for the following events:\n {0}".format(event_ids)

If no object found for all events: "No objects were found for the provided events."

The action should fail and stop a playbook execution:

if fatal error, like wrong credentials, no connection to server, other:

print "Error executing action "List Event Objects". Reason: {0}''.format(error.Stacktrace)

General
CSV Table

Table name: Event {0} Objects

Table Columns:

  • Object UUID (mapped as uuid)
  • Name (mapped as name)
  • Category (mapped as meta-category)
  • Description (mapped as description)
  • Comment (mapped as comment)

Get Event Details

Description

Retrieve details about events in MISP.

Parameters

Parameter Display NameTypeIs MandatoryDescription
Event IDStringYesSpecify a comma-separated list of IDs or UUIDs of the events for which you want retrieve details.
Return Attributes InfoCheckboxCheckedIf enabled, action will create a case wall table for all of the attributes that are a part of the event.

Run On

This action doesn't run on entities.

Action Results

Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
Case Wall
Result TypeValue DescriptionType
Output message*

The action should not fail nor stop a playbook execution:

If action completed successfully for at least one of the provided ids:

Print "Successfully retrieved information for the following events: <>"

If action failed to run for at least one of the provided incident ids:

Print "Failed to retrieved information for the following events: <>

The action should fail and stop a playbook execution:
if fatal error, SDK error, like wrong credentials, no connection, other:
Print "Error executing action "Get Event Details". Reason: {0}''.format(error.Stacktrace

The action should fail and stop a playbook execution:

if fatal error, like wrong credentials, no connection to server, other:

print "Error executing action "List Event Objects". Reason: {0}''.format(error.Stacktrace)

General
CSV Table

Table Name: Event {0} Attributes Details".format(event_id)

Columns:

  1. ID
  2. Value
  3. Comment
  4. Type
  5. Category
  6. UUID
  7. Distribution
  8. Timestamp

List Sightings of an Attribute

Description

List available sightings for attributes in MISP.

Parameters

search
Parameter NameTypeDefault ValueMandatoryDescription
Attribute NameCSVNoSpecify a comma-separated list of attribute identifiers for which you want to list sightings. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.
Event IDStringNoSpecify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event".
CategoryCSVNoSpecify a comma-separated list of categories. If specified, action will only list sightings for attributes that have matching category. If nothing is specified, action will ignore categories in attributes. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation.
TypeCSVNoSpecify a comma-separated list of attribute types. If specified, action will only list sightings for attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. Example values: md5, sha1, ip-src, ip-dst
Attribute SearchDDL

Provided Event

Possible values:

All Events

YesSpecify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and list sightings for all attributes that match our criteria.
Attribute UUIDCSVNoSpecify a comma-separated list of attribute UUIDs for which you want to list sightings. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.
Action Results
Script Result
Script Result NameValue OptionsExample
is_successTrue/Falseis_success:False
Case Wall
Result typeValue/DescriptionType
Output message*

If successfully listed sightings to at least one attribute: "Successfully listed sightings for the following attributes in MISP:\n{0}".format(attribute name/attribute UUID)

if not successfully listed sightings for at least one attribute: "Action didn't list sightings for the following attributes in MISP:\n{0}".format(attribute name/attribute UUID)

If not successful for all or no sightings for all attributes: "No sightings were found for the provided attributes in MISP"

Critical Error (fail action) "Error executing action "List Sightings of an Attribute". Reason: {0}".format(stacktrace)

If invalid parameter is specified in "Category" (fail action): "Error executing action "List Sightings of an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation".

If "Provided Event" is selected, but Event ID is not selected: "Error executing action "List Sightings of an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"".

General

Set IDS Flag for an Attribute

Description

Set IDS flag for attributes in MISP.

Parameters

searchsearch
Parameter NameTypeDefault ValueMandatoryDescription
Attribute NameCSVNoSpecify a comma-separated list of attribute identifiers for which you want to set an IDS flag. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.
Event IDStringNoSpecify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event".
CategoryCSVNoSpecify a comma-separated list of categories. If specified, action will only set IDS flag for attributes that have matching category. If nothing is specified, action will ignore categories in attributes. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation.
TypeCSVNoSpecify a comma-separated list of attribute types. If specified, action will only set IDS flag for attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. Example values: md5, sha1, ip-src, ip-dst
Attribute SearchDDL

Provided Event

Possible values:

All Events

YesSpecify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and set IDS flag for all attributes that match our criteria.
Attribute UUIDCSVNo

Specify a comma-separated list of attribute UUIDs for which you want to set an IDS flag.
Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.

Action Results

Script Result
Script Result NameValue OptionsExample
successTrue/Falsesuccess:False
Case Wall
Result TypeValue DescriptionType
Output message*

If successfully added IDS flag to at least one attribute: "Successfully set IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID)

if not successfully added IDS flag to at least one attribute: "Action didn't set IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID)

If not successful for all: "IDS flag was not set for the provided attributes in MISP"

Critical Error (fail action) "Error executing action "Set IDS Flag for an Attribute". Reason: {0}".format(stacktrace)

If invalid parameter is specified in "Category" (fail action): "Error executing action "Set IDS Flag for an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation".

If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Set IDS Flag for an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"".

Event ID is not found (fail action) "Error executing action "Set IDS Flag for an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Unset IDS Flag for an Attribute

Description

Unset IDS flag for attributes in MISP.

Parameters

NameTypeDefault ValueMandatoryDescription
Attribute NameCSVNo

Specify a comma-separated list of attribute identifiers for which you want to unset an IDS flag.
Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.

Event IDStringNoSpecify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event".
CategoryCSVNoSpecify a comma-separated list of categories. If specified, action will only unset IDS flag for attributes that have matching category. If nothing is specified, action will ignore categories in attributes. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation.
TypeCSVNoSpecify a comma-separated list of attribute types. If specified, action will only unset IDS flag for attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. Example values: md5, sha1, ip-src, ip-dst
Attribute SearchDDL

Provided Event

Possible values:

All Events

TrueSpecify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and unset IDS flag for all attributes that match our criteria.
Attribute UUIDCSVNoSpecify a comma-separated list of attribute UUIDs for which you want to unset an IDS flag. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values.

Action Results

Script Result
Script Result NameValue OptionsExample
successTrue/Falsesuccess:False
Case Wall
Result TypeValue DescriptionType
Output message*

If successfully removed IDS flag to at least one attribute: "Successfully unset IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID)

if not successfully removed IDS flag to at least one attribute: "Action didn't unset IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID)

If not successful for all: "IDS flag was not unset for the provided attributes in MISP"

Critical Error (fail action) "Error executing action "Unset IDS Flag for an Attribute". Reason: {0}".format(stacktrace)

If invalid parameter is specified in "Category" (fail action): "Error executing action "Unset IDS Flag for an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation".

If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Unset IDS Flag for an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"".

Event ID is not found (fail action) "Error executing action "Unset IDS Flag for an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id)

General

Connector

MISP - Attributes Connector

Description

Pull attributes from MISP.

Configure MISP - Attributes Connector on Google SecOps

For detailed instructions on how to configure a connector inGoogle SecOps, seeConfiguring theconnector.

Connector parameters

Use the following parameters to configure the connector:

Param NameTypeDefault ValueIs MandatoryDescription
DeviceProductFieldStringProduct NameYesEnter the source field name in order to retrieve the Product Field name.
EventClassIdStringalertTypeYesEnter the source field name in order to retrieve the Event Field name.
PythonProcessTimeoutInteger180YesTimeout limit for the python process running the current script.
API RootStringN/AYesAPI Root for MISP account.
API KeyPasswordYesAPI Key of the MISP account.
Fetch Max Hours BackwardsInteger1NoAmount of hours from where to fetch attributes.
Max Attributes Per CycleInteger50YesHow many attributes to process per one connector iteration.
Lowest Threat Level To FetchInteger1YesLowest severity that will be used to fetch alerts. Possible values: 1-4.
Attribute Type FilterStringNoFilter attributes by their type, comma separated. If provided, only attributes with whitelisted type will be processed.
Category FilterStringNoFilter attributes by their category, comma separated. If provided, only attributes with whitelisted category will be processed.
Galaxy FilterStringNoFilter attributes by their parent event's galaxy, comma separated. If provided, only attributes that belong to an event with a whitelisted galaxy will be processed.
Verify SSLCheckboxYesIf enabled, verify the SSL certificate for the connection to the CheckPoint Cloud Guard server is valid.
Environment Field NameStringNoDescribes the name of the field where the environment name is stored. If the environment field isn't found, the environment is the default environment.
Environment Regex PatternString.*NoA regex pattern to run on the value found in the \"Environment Field Name\" field. Default is .* to catch all and return the value unchanged. Used to allow the user to manipulate the environment field via regex logic. If the regex pattern is null or empty, or the environment value is null, the final environment result is the default environment.
Proxy Server AddressStringNoThe address of the proxy server to use.
Proxy UsernameStringNoThe proxy username to authenticate with.
Proxy PasswordPasswordNoThe proxy password to authenticate with.

Need more help?Get answers from Community members and Google SecOps professionals.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.