MISP
Integration version: 31.0
Configure MISP Integration to work with Google Security Operations SOAR
Configure MISP integration with a CA certificate
You can verify your connection with a CA certificate file if needed.
Before you start, ensure you have the following:
- The CA certificate file
- The latest MISP integration version
To configure the integration with a CA certificate, complete the following steps:
- Parse your CA certificate file into a Base64 String.
- Open the integration configuration parameters page.
- Insert the string in the CA Certificate File field.
- To test that the integration is successfully configured, select the Verify SSL checkbox and click Test.
Automation Key
The authentication is performed via a secure key available in the MISP UI. The API key is available in the event actions menu under automation.
Configure MISP integration in Google Security Operations SOAR
For detailed instructions on how to configure an integration in Google Security Operations SOAR, see Configure integrations.
Integration parameters
Use the following parameters to configure the integration:
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Instance Name | String | N/A | No | Name of the Instance you intend to configure integration for. |
Description | String | N/A | No | Description of the Instance. |
API Root | https://<IP> | Yes | Address of the MISP instance. | |
API Key | String | N/A | Yes | Generated in MISP's console. |
Use SSL | Checkbox | Unchecked | No | Use this checkbox, if your MISP connection requires an SSL verification (unchecked by default). |
Run Remotely | Checkbox | Unchecked | No | Check the field in order to run the configured integration remotely. Once checked, the option appears to select the remote user (agent). |
Actions
Add Attribute
Description
Add an entity as an attribute to a MISP event.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | The ID of the event. |
Category | String | External analysis | No | The category of the attribute. Default: External analysis. |
Distribution | String | 1 | No | The distribution of the attribute. Default: 1. |
For Intrusion Detection System | Checkbox | Unchecked | No | Whether the attribute is used for Intrusion Detection System. Default: false. |
Comment | String | N/A | No | The comment to add to the attribute. |
Use cases
N/A
Run On
This action runs on the following entities:
- URL
- Hostname
- IP Address
- Filehash
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success | True/False | success:False |
JSON Result
N/A
Create Event
Description
Create a new MISP event.
Known Limitation
Currently, MISP API doesn't allow event to be immediately published upon creation. You need to first create an event and then use action "Publish Event".
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event Name | String | N/A | Yes | The name of the event. |
Threat Level | String | 0 | No | The threat level of the event. Default: 0. |
Distribution | String | 1 | No | The distribution of the attribute. Default: 1. |
Analysis | String | 0 | No | The analysis level of the event [0-2]: Default: 0. |
Publish | Checkbox | Checked | No | Whether to publish the event or not. |
Comment | String | N/A | No | The comment of the event. |
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
event_id | N/A | N/A |
Add Tag to an Event
Description
Add a tag to an event action allows a user to add a tag to a specific event in MISP. This adds a classification to the event based on the category of the security threat posed by the IOC associated with the event.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | The unique identifier specifying the event to add tag to. |
Tag Name | String | N/A | Yes | The name of the tag to add to an event. |
Use cases
Classify an event: Update the event through adding a tag.
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"saved": true,
"success": "Tag(s) added.",
"check_publish": true
}
]
Download File
Description
Download files related to event in MISP.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | No | Specify the ID or UUID of the event from which you want to download files |
Download Folder Path | String | N/A | Specify the absolute path to the folder, which should store files. If nothing is specified, action will create an attachment instead. |
|
Overwrite | Checkbox | Unchecked | If enabled, action will overwrite existing files. |
Run On
This action runs on the Filehash entity.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success | True/False | success:False |
JSON Result
{
"absolute_paths": ["/etc/file1.txt", "/etc/file2.txt"]
}
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If success: "Successfully downloaded the following files from the event with {0} {1} in MISP:\n{2}".format(ID/UUID, event_id, result/filename from the response) if no files were found: "No files were found for the event with {0} {1} in MISP:\n{2}".format(ID/UUID, event_id) if "Download Folder Path" is not specified and some of the files exceeded platform limit for attachments: "Action wasn't able to download the following files, because they exceeded the limit of 3 MB: \n {0}. \n Please specify a folder path in the parameter "Download Folder Path" in order to download them.".(result/filename) Critical Error (fail action) "Error executing action "Download File". Reason: {0}".format(stacktrace) Event ID is not found (fail action) "Error executing action "Download File". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) If overwrite is false and one of the files already exists: "Error executing action "Download File". Reason: The following files already exist: {0}. Please remove them or set parameter "Overwrite" to true.".format(absolute path to the file) |
General |
Enrich Entities
Description
Enrich entities based on the attributes in MISP.
Parameters
Parameter Display Name | Type | Default Value | Description |
---|---|---|---|
Number of attributes to return | String | N/A | Specify how many attributes to return for entities. |
Filtering condition | Specify the filtering condition for the action. If "Last" is selected, action will use the oldest attribute for enrichment, if "First" is selected, action will use the newest attribute for enrichment. | ||
Threat Level Threshold | DDL | Low Possible Values: High Medium Low Undefined |
Specify what should be the threshold for the threat level of the event, where the entity was found. If related event exceeds or matches threshold, entity will be marked as suspicious. |
Attribute Search Limit | Integer | 50 | Specify how many attributes to search for per entity. This parameter has an impact on which attribute will be selected for enrichment. Default: 50. |
Run On
This action runs on the following entities:
- URL
- Hostname
- IP Address
- Filehash
Action Results
Entity Enrichment
Entities are marked as suspicious if the threat level of the event exceeds 0. Otherwise: False
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success | True/False | success:False |
JSON Result
[
{
"EntityResult": [
{
"Event":
{
"orgc_id": "1",
"ShadowAttribute": [],
"id": "3",
"threat_level_id": "3",
"event_creator_email": "john_doe@example.com",
"uuid": "5c5bff1b-a414-4a83-8755-035f0a000016",
"Object": [],
"Orgc": {
"uuid": "5c5ac66e-3884-4031-afd7-46f5bb9ebcaa",
"name": "ORGNAME",
"id": "1"
},
"Org": {
"uuid": "5c5ac66e-3884-4031-afd7-46f5bb9ebcaa",
"name": "ORGNAME",
"id": "1"
},
"RelatedEvent": [],
"sharing_group_id": "0",
"timestamp": "1549533154",
"date": "2019-02-07",
"disable_correlation": "False",
"info": "Test event",
"locked": "False",
"publish_timestamp": "1549533214",
"Attribute": [
{
"category": "Network activity",
"comment": " ",
"uuid": "5c5bffe2-9298-4098-ae31-035d0a000016",
"deleted": "False",
"timestamp": "1549533154",
"to_ids": "False",
"distribution": "3",
"object_id": "0",
"event_id": "3",
"ShadowAttribute": [],
"sharing_group_id": "0",
"value": "1.1.1.1",
"disable_correlation": "False",
"object_relation": "None",
"type": "ip-src",
"id": "1",
"Galaxy": []
}],
"attribute_count": "1",
"org_id": "1",
"analysis": "2",
"extends_uuid": " ",
"published": "True",
"distribution": "3",
"proposal_email_lock": "False",
"Galaxy": []
}}],
"Entity": "1.1.1.1"
}
]
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | For attributes that were found: (is_success=true) "Successfully enriched the following entities using MISP: \n{0}".format(entity.identifier) For attributes that were not found (is_success=true) "Action wasn't able to enrich the following entities using MISP: \n{0}".format(entity.identifier) If all attributes were not found (is_success=false) "No entities were enriched using MISP" If attributes are suspicious (is_success=true) "The following attributes were marked as suspicious using MISP: \n {0}".format(entity.identifier) |
General |
CSV Table | Table Columns:
|
Get Related Events
Description
Retrieve information about events that are related to entities in MISP.
Parameters
Parameter Display Name | Type | Default Value | Description |
---|---|---|---|
Mark As Suspicious | Checkbox | Checked | If enabled, action will mark entity as suspicious, if there is at least one related event to it. |
Run On
This action runs on the following entities:
- URL
- Hostname
- IP Address
- Filehash
Action Results
Entity Enrichment
If records of related events are available, then entities are marked as suspicious. otherwise: False.
Enrichment Field Name | Logic - When to apply |
---|---|
Event | Returns if it exists in JSON result |
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success | True/False | success:False |
JSON Result
[
{
"EntityResult": [
{
"Event":
{
"orgc_id": "1",
"ShadowAttribute": [],
"id": "3",
"threat_level_id": "3",
"event_creator_email": "john_doe@example.com",
"uuid": "5c5bff1b-a414-4a83-8755-035f0a000016",
"Object": [],
"Orgc": {
"uuid": "5c5ac66e-3884-4031-afd7-46f5bb9ebcaa",
"name": "ORGNAME",
"id": "1"
},
"Org": {
"uuid": "5c5ac66e-3884-4031-afd7-46f5bb9ebcaa",
"name": "ORGNAME",
"id": "1"
},
"RelatedEvent": [],
"sharing_group_id": "0",
"timestamp": "1549533154",
"date": "2019-02-07",
"disable_correlation": "False",
"info": "Test event",
"locked": "False",
"publish_timestamp": "1549533214",
"Attribute": [
{
"category": "Network activity",
"comment": " ",
"uuid": "5c5bffe2-9298-4098-ae31-035d0a000016",
"deleted": "False",
"timestamp": "1549533154",
"to_ids": "False",
"distribution": "3",
"object_id": "0",
"event_id": "3",
"ShadowAttribute": [],
"sharing_group_id": "0",
"value": "1.1.1.1",
"disable_correlation": "False",
"object_relation": "None",
"type": "ip-src",
"id": "1",
"Galaxy": []
}],
"attribute_count": "1",
"org_id": "1",
"analysis": "2",
"extends_uuid": " ",
"published": "True",
"distribution": "3",
"proposal_email_lock": "False",
"Galaxy": []
}}],
"Entity": "1.1.1.1"
}
]
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If one event found for at least one entity: "Successfully retrieved information about the related events for the following entities: \n{0}".format(entity.identifier) If no event found for at least one entity: "Action wasn't able to retrieve information about the related events for the following entities: \n{0}".format(entity.identifier If no events for all: "No related events were found for the provided entities." |
General |
Upload File
Description
Upload a file to a MISP event.
Parameters
Name | Type | Default | Description |
---|---|---|---|
Event ID | String | N/A | Specify the ID or UUID of the event to which you want to upload this file. |
File Path | String | N/A | Specify a comma-separated list of absolute filepaths of the files that you want to upload to MISP. |
Category | Specify the category for the uploaded file. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation. | ||
Distribution | String | Community | Specify the distribution for the uploaded file. |
Threat Level | String | High | Specify the threat level for the uploaded file. |
Analysis | String | Initial | Specify the analysis of the event. |
Info | String | N/A | Specify additional info for the uploaded file. |
For Intrusion Detection System | Checkbox | Unchecked | If enabled, uploaded file will be used for intrusion detection systems. |
Comment | String | N/A | Specify additional comments related to the uploaded file. |
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
{
"Event": {
"id": "106",
"orgc_id": "1",
"org_id": "1",
"date": "2021-01-15",
"threat_level_id": "1",
"info": "vanuhi 1015",
"published": false,
"uuid": "1cd22aa2-57e8-4fc8-bac6-721c1be2c27d",
"attribute_count": "10",
"analysis": "0",
"timestamp": "1610893968",
"distribution": "1",
"proposal_email_lock": false,
"locked": false,
"publish_timestamp": "0",
"sharing_group_id": "0",
"disable_correlation": false,
"extends_uuid": "",
"event_creator_email": "admin@admin.test",
"Org": {
"id": "1",
"name": "ORGNAME",
"uuid": "09b0dde1-2934-4310-a107-74b6f534f041",
"local": true
},
"Orgc": {
"id": "1",
"name": "ORGNAME",
"uuid": "09b0dde1-2934-4310-a107-74b6f534f041",
"local": true
},
"Attribute": [],
"ShadowAttribute": [],
"Object": [
{
"id": "446",
"name": "file",
"meta-category": "file",
"description": "File object describing a file with meta-information",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "20",
"event_id": "106",
"uuid": "0188ba5d-68eb-4b5c-8e05-6fd49f8eee9a",
"timestamp": "1610691647",
"distribution": "1",
"sharing_group_id": "0",
"comment": "",
"deleted": false,
"first_seen": null,
"last_seen": null,
"ObjectReference": [],
"Attribute": [
{
"id": "1859",
"type": "malware-sample",
"category": "External analysis",
"to_ids": true,
"uuid": "7920cd28-5082-47ce-9c3e-3ccbd5dae138",
"event_id": "106",
"distribution": "1",
"timestamp": "1610703650",
"comment": "",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "446",
"object_relation": "malware-sample",
"first_seen": null,
"last_seen": null,
"value": "vanuhi.txt|7bd55b0a276e076cbaf470e64359adb8",
"Galaxy": [],
"data": "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",
"ShadowAttribute": [],
"Sighting": [
{
"id": "1733",
"attribute_id": "1859",
"event_id": "106",
"org_id": "1",
"date_sighting": "1611207638",
"uuid": "feb085f1-1923-4327-a73d-b60a948377e4",
"source": "",
"type": "0",
"Organisation": {
"id": "1",
"uuid": "09b0dde1-2934-4310-a107-74b6f534f041",
"name": "ORGNAME"
},
"attribute_uuid": "7920cd28-5082-47ce-9c3e-3ccbd5dae138"
}
]
}
}
}
}
Case Wall
Result type | Value/Description | Type |
---|---|---|
Output message* | If successful for one entity:"Succesfully uploaded the provided files to the event {0} in MISP".format(event_id) Critical Error (fail action) "Error executing action "Upload File". Reason: {0}".format(stacktrace) If invalid parameter is specified in "Distribution" (fail action): "Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Distribution". Acceptable numbers: 0,1,2,3. Acceptable strings: Organisation, Community, Connected, All". If invalid parameter is specified in "Threat Level" (fail action): "Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Threat Level". Acceptable numbers: 1,2,3,4. Acceptable strings: High, Medium, Low, Undefined". If invalid parameter is specified in "Category" (fail action): "Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation". If invalid parameter is specified in "Analysis" (fail action): "Error executing action "Upload File". Reason: Invalid value was provided for the parameter "Analysis". Acceptable numbers: 0,1,2. Acceptable strings: Initial, Ongoing, Completed". if at least one of the files is not available "Error executing action "Upload File". Reason: the following files were not accessible: \n {0}".format(file paths, that were not accessible.) Event ID is not found (fail action) "Error executing action "Upload File". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Ping
Description
Test Connectivity.
Parameters
N/A
Use cases
N/A
Run On
This action runs on all entities.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success | True/False | success:False |
JSON Result
N/A
Remove Tag From an Event
Description
Remove tags from event in MISP.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify the ID or UUID of the event, from which you want to remove tags. |
Tag Name | CSV | N/A | Yes | Specify a comma-separated list of tags that you want to remove from events. |
Use cases
Re-classify event: Remove tag for reclassification.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"saved": true,
"success": "Tag removed.",
"check_publish": true
}
]
Case Wall
Result type | Value/Description | Type |
---|---|---|
Output message* | If successfully removed all tag from an event: "Successfully removed the following tags from the event with {0} {1} in MISP: {2}.".format(ID/UUID, event_id, tags) If not successfully removed some tags from an event: "Action wasn't able to remove the following tags from the event with {0} {1} in MISP: {2}.".format(ID/UUID, event_id, tags) If not successful for all: "No tags were removed from the event with {0} {1} in MISP".format(ID/UUID, event_id) If at least one tag was not found: "The following tags were not found in MISP: \n{0}".format(list of tags that were not found in MISP) If all tags were not found: "None of the provided tags were found in MISP." Critical Error (fail action) "Error executing action "Remove Tag from an Event". Reason: {0}".format(stacktrace) Event ID is not found (fail action) "Error executing action "Remove Tag from an Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Add Tag to an Attribute
Description
This action allows a user to add a tag to a specific attribute in MISP. This adds a classification to the attribute based on the category of a security threat posed by the IOC in the attribute.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | Integer | N/A | Yes | The identifier of the event that the attribute is associated with. Example: 1. |
Tag Name | String | N/A | Yes | The name of the tag to add to an attribute. |
Attribute Name | String | N/A | Yes | The name identifier of the attribute to tag. |
Category | String | N/A | Yes | The category which the attribute belongs to. e.g. Payload Delivery. |
Type | String | N/A | Yes | The type of the attribute. e.g. filename. |
Object UUID | String | N/A | No | The unique identifier for an object in the event. |
Use cases
Classify attribute based on IOC type: Add tag to attribute.
Run On
This action runs on all entities.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"name": "Global tag unique___test(7) successfully attached to Attribute(9).",
"message": "Global tag unique___test(7) successfully attached to Attribute(9).",
"url": "/tags/attachTagToObject"
}
]
Remove Tag From an Attribute
Description
Remove tags from attributes in MISP.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | No | Specify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event". |
Tag Name | CSV | N/A | Yes | Specify a comma-separated list of tags that you want to remove from attributes. |
Attribute Name | CSV | N/A | No | Specify a comma-separated list of attribute identifiers from which you want to remove tags. |
Category | CSV | N/A | No | Specify a comma-separated list of categories. If specified, action will only remove tags from attributes that have matching category. If nothing is specified, action will ignore categories in attributes. |
Type | CSV | N/A | No | Specify a comma-separated list of attribute types. If specified, action will only remove tags from attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. |
Object UUID | CSV | N/A | Specify the UUID of the object that contains the desired attribute. | |
Attribute Search | DDL | Provided Event Possible values: All Events Provided Event |
Yes | Specify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and remove tags from all attributes that match our criteria. |
Attribute UUID | CSV | Specify a comma-separated list of attribute UUIDs from which you want to remove new tags. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values. |
Use cases
Re-classify attribute: Remove tag for reclassification
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"name": "Tag unique___test(7) successfully removed from Attribute(9).",
"message": "Tag unique___test(7) successfully removed from Attribute(9).",
"url": "/tags/removeTagFromObject"
}
]
Case Wall
Result type | Value/Description | Type> |
---|---|---|
Output message* | If successfully removed tags from at least one attribute: "Successfully removed tags from the following attributes in MISP:\n{0}".format(attribute name/object UUID) if not successfully removed tags from at least one attribute: "Action didn't removed tags from the following attributes in MISP:\n{0}".format(attribute name/object UUID) If not successful for all: "No tags were removed from the provided attributes in MISP" If at least one tag was not found: "The following tags were not found in MISP: \n{0}".format(list of tags that were not found in MISP) If all tags were not found: "None of the provided tags were found in MISP." Critical Error (fail action) "Error executing action "Remove Tag from an Attribute". Reason: {0}".format(stacktrace) If invalid parameter is specified in "Category" (fail action): "Error executing action "Remove Tag from an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation". If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Remove Tag from an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"". Event ID is not found (fail action) "Error executing action "Remove Tag from an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Publish Event
Description
The action allows the user to publish an event. Publishing an event shares it to the sharing group selected, making it visible to all members.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify the ID or UUID of the event that you want to publish. |
Use cases
Publish an event:
- Create even
- Add event attributes
- Publish event
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"Event": {
"id": "3",
"orgc_id": "1",
"org_id": "1",
"date": "2019-12-27",
"threat_level_id": "1",
"info": "Connection to .ch",
"published": true,
"uuid": "5e05dd29-7b90-474d-b5f6-51ae0a00024b",
"attribute_count": "0",
"analysis": "1",
"timestamp": "1577774920",
"distribution": "3",
"proposal_email_lock": false,
"locked": false,
"publish_timestamp": "1577774846",
"sharing_group_id": "0",
"disable_correlation": false,
"extends_uuid": "5e05db24-1e98-4bb9-bd56-51fd0a00024b",
"event_creator_email": "admin@admin.test",
"Org": {
"id": "1",
"name": "ORGNAME",
"uuid": "5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef",
"local": true
},
"Orgc": {
"id": "1",
"name": "ORGNAME",
"uuid": "5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef",
"local": true
},
"Attribute": [],
"ShadowAttribute": [],
"RelatedEvent": [],
"Galaxy": [],
"Object": [],
"Tag": [
{
"id": "7",
"name": "unique___test",
"colour": "#9648c4",
"exportable": true,
"user_id": "0",
"hide_tag": false,
"numerical_value": null,
"local": 0
}
]
}
}
]
Case Wall
Result type | Value/Description | Type |
---|---|---|
Output message* | If successful: "Successfully published event with {0} {1} in MISP.".format(ID/UUID, event_id) If not successful: "Event with {0} {1} was not published in MISP".format(ID/UUID, event_id) Critical Error (fail action) "Error executing action "Publish Event". Reason: {0}".format(stacktrace) Event ID is not found (fail action) "Error executing action "Publish Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Unpublish Event
Description
The action allows the user to unpublish an event. Unpublishing an event prevents it from being visible to the shared groups.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify the ID or UUID of the event that you want to unpublish. |
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"Event": {
"id": "3",
"orgc_id": "1",
"org_id": "1",
"date": "2019-12-27",
"threat_level_id": "1",
"info": "Connection to .ch",
"published": false,
"uuid": "5e05dd29-7b90-474d-b5f6-51ae0a00024b",
"attribute_count": "0",
"analysis": "1",
"timestamp": "1577774920",
"distribution": "3",
"proposal_email_lock": false,
"locked": false,
"publish_timestamp": "1577774846",
"sharing_group_id": "0",
"disable_correlation": false,
"extends_uuid": "5e05db24-1e98-4bb9-bd56-51fd0a00024b",
"event_creator_email": "admin@admin.test",
"Org": {
"id": "1",
"name": "ORGNAME",
"uuid": "5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef",
"local": true
},
"Orgc": {
"id": "1",
"name": "ORGNAME",
"uuid": "5dfc9b8f-c320-4b6d-ac1c-4f4e8bdc3fef",
"local": true
},
"Attribute": [],
"ShadowAttribute": [],
"RelatedEvent": [],
"Galaxy": [],
"Object": [],
"Tag": [
{
"id": "7",
"name": "unique___test",
"colour": "#9648c4",
"exportable": true,
"user_id": "0",
"hide_tag": false,
"numerical_value": null,
"local": 0
}
]
}
}
]
Case Wall
Result type | Value/Description | Type |
---|---|---|
Output message* | If successful: "Successfully unpublished event with {0} {1} in MISP.".format(ID/UUID, event_id) If not successful: "Event with {0} {1} was not unpublished in MISP".format(ID/UUID, event_id) Critical Error (fail action) "Error executing action "Unpublish Event". Reason: {0}".format(stacktrace) Event ID is not found (fail action) "Error executing action "Unpublish Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Delete an Attribute
Description
Delete attributes in MISP. Supported hashes: MD5, SHA1, SHA224, SHA256, SHA384, SHA512, SSDeep.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | No | Specify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event". |
Attribute Name | CSV | N/A | No | Specify a comma-separated list of attribute identifiers that you want to delete. |
Category | CSV | N/A | No | Specify a comma-separated list of categories. If specified, action will only delete attributes that have matching category. If nothing is specified, action will ignore categories in attributes. |
Type | CSV | N/A | No | Specify a comma-separated list of attribute types. If specified, action will only delete attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. |
Object UUID | String | N/A | No | The unique identifier for an object in the event. |
Attribute Search | DDL | Provided Event Possible values: All Events Provided Event |
Yes | Specify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and delete all attributes that match our criteria. |
Attribute UUID | CSV | Specify a comma-separated list of attribute UUIDs that you want to delete. |
Use cases
Remove an attribute from an event.
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"message": "Attribute deleted."
}
]
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If successfully added Sighting to at least one attribute: "Successfully deleted the following attributes in MISP:\n{0}".format(attribute name/object UUID) if not successfully added Sighting to at least one attribute: "Action didn't delete the following attributes in MISP:\n{0}".format(attribute name/object UUID) If not successful for all: "No attributes were deleted in MISP" Critical Error (fail action) "Error executing action "Delete an Attribute". Reason: {0}".format(stacktrace) If invalid parameter is specified in "Category" (fail action): "Error executing action "Delete an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation". If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Delete an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"". Event ID is not found (fail action) "Error executing action "Delete an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Delete an Event
Description
Delete event in MISP.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify the ID or UUID of the event that you want to delete. |
Use cases
Delete an event permanently.
Run On
This action runs on the User entity.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
[
{
"name": "Event deleted.",
"message": "Event deleted.",
"url": "/events/delete/4"
}
]
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If successful: "Successfully deleted event with {0} {1} in MISP".format(ID/UUID, event_id) Critical Error (fail action) "Error executing action "Delete an Event". Reason: {0}".format(traceback) Event ID is not found (fail action) "Error executing action "Delete an Event". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Create File Misp Object
Description
The action allows the user to organize file attributes related to an event in a single object which describes a file with its meta-information. The object with the attributes is then attached to a specified event.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | The unique identifier of the event to add the object. Example: 1 |
Filename | String | N/A | No | The filename of the file. |
MD5 | String | N/A | No | The md5 hash value of the file. |
SHA1 | String | N/A | No | The sha1 hash value of the file. |
SHA256 | String | N/A | No | The sha256 hash value of the file. |
SSDEEP | String | N/A | No | The ssdeep value of the file Example: 96:p5aAS1tN0M3t9AnTNuG6TNOt5PR1TNZdkljOXTNSnKTF3X7KsTFW+kLtW6K8i7bI:p5mb4rgQhRp7GljCbF3LKqFjkwxtU |
Imphash | String | N/A | No | The MD5 hash value calculated from the imported table. |
Use cases
N/A
Run On
This action runs on all entities.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Create IP-Port Misp Object
Description
The action allows the user to organize IP-port attributes related to an event in a single object which describes an IP address (or domain or hostname) and a port seen as a tuple (or as a triple) in a specific time frame . The object with the attributes is then attached to a specified event.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | The unique identifier of the event to add the object. Example: 1 |
Dst-port | String | N/A | No | Destination port. |
Src-port | String | N/A | No | Source port. |
Domain | String | N/A | No | Domain. |
Hostname | String | N/A | No | Hostname. |
IP-Src | String | N/A | No | Source IP Address. |
IP-Dst | String | N/A | No | Destination IP Address. |
Use cases
N/A
Run On
This action runs on all entities.
Action Results
Entity Enrichment
N/A
Insights
N/A
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Create network-connection Misp Object
Description
Create a network-connection Object in MISP. Requires one of the following: Dst-port, Src-port, IP-Src, IP-Dst to be provided or "Use Entities" parameter set to true.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify the ID or UUID of the event to which you want to add network-connection objects. |
Dst-port | String | N/A | No | Specify the destination port, which you want to add to the event. |
Src-port | String | N/A | No | Specify the source port, which you want to add to the event. |
Hostname-dst | String | N/A | No | Specify the source destination, which you want to add to the event. |
Hostname-src | String | N/A | No | Specify the source hostname, which you want to add to the event. |
IP-Src | String | N/A | No | Specify the source IP, which you want to add to the event. |
IP-Dst | String | N/A | No | Specify the destination IP, which you want to add to the event. |
Layer3-protocol | String | N/A | No | Specify the related layer 3 protocol, which you want to add to the event. |
Layer4-protocol | String | N/A | No | Specify the related layer 4 protocol, which you want to add to the event. |
Layer7-protocol | String | N/A | No | Specify the related layer 7 protocol, which you want to add to the event. |
Use Entities | Checkbox | Unchecked | No | If enabled, action will use entities in order to create objects. Supported entities: IP Address. "Use Entities" has priority over other parameters. |
IP Type | DDL | Source IP Possible values: Source IP Destination IP |
Specify what attribute type should be used with IP entities. |
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If success and "Use Entities" is not true: "Successfully created new network-connection object for event with {0} {1} in MISP.".format(ID/UUID, event_id) If not success and "Use Entities" is not true: "Action wasn't able to created new network-connection object for event with {0} {1} in MISP. Reason: {2}".format(ID/UUID) If success for one and "Use Entities" is true: "Successfully created new network-connection objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers) If not success for one and "Use Entities" is true: "Action wasn't able to create new network-connection objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers) If not success for all and "Use Entities" is true: "Action wasn't able to create new network-connection objects for event with {0} {1} in MISP based on the provided entities.".format(ID/UUID, event_id) Critical Error (fail action) "Error executing action "Create network-connection Misp Object". Reason: {0}".format(stacktrace) Event ID is not found (fail action) "Error executing action "Create network-connection Misp Object". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) If none of the Dst-port, Src-port, IP-Src, IP-Dst are provided and "Use Entities" == false: "Error executing action "Create network-connection Misp Object". Reason: One of the: "Dst-port", "Src-port", "IP-Src", "IP-Dst" should be provided or "Use Entities" parameter set to true". |
General |
Create Url Misp Object
Description
Create a URL Object in MISP. Requires "URL" to be provided or "Use Entities" parameter set to true.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify the ID or UUID of the event to which you want to add URL objects. |
URL | String | N/A | No | Specify the URL, which you want to add to the event. |
Port | String | N/A | No | Specify the port, which you want to add to the event. |
First seen | String | N/A | No | Specify, when the URL was first seen. |
Last seen | String | N/A | No | Specify, when the URL was last seen. |
Domain | String | N/A | No | Specify the domain, which you want to add to the event. |
Text | String | N/A | No | Specify the additional text, which you want to add to the event. |
IP | String | N/A | No | Specify the IP, which you want to add to the event. |
Host | String | N/A | No | Specify the Host, which you want to add to the event. |
Use Entities | Checkbox | Unchecked | If enabled, action will use entities in order to create objects. Supported entities: URL. "Use Entities" has priority over other parameters. |
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
N/A
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If success and "Use Entities" is not true: "Successfully created new URL object for event with {0} {1} in MISP.".format(ID/UUID, event_id) If not success and "Use Entities" is not true: "Action wasn't able to created URL object for event with {0} {1} in MISP. Reason: {2}".format(ID/UUID) If success for one and "Use Entities" is true: "Successfully created new URL objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers) If not success for one and "Use Entities" is true: "Action wasn't able to create new URL objects for event with {0} {1} in MISP based on the following entities: \n{0}".format(ID/UUID, event_id, entity.identifiers) If not success for all and "Use Entities" is true: "Action wasn't able to create new URL objects for event with {0} {1} in MISP based on the provided entities.".format(ID/UUID, event_id) Critical Error (fail action) "Error executing action "Create Url Misp Object". Reason: {0}".format(stacktrace) Event ID is not found (fail action) "Error executing action "Create Url Misp Object". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) If none of the URL are provided and "Use Entities" == false: "Error executing action "Create Url Misp Object". Reason: Either "URL" should be provided or "Use Entities" parameter set to true". |
General |
Create Virustotal-Report Object
Description
Create a Virustotal-Report Object in MISP.
Parameters
Parameter Display Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify the ID or UUID of the event to which you want to add URL objects. |
Permalink | String | N/A | Yes | Specify the link to the VirusTotal report, which you want to add to the event. |
Comment | String | N/A | No | Specify the comment, which you want to add to the event. |
Detection Ratio | String | N/A | No | Specify the detection ration, which you want to add to the event. |
Community Score | String | N/A | No | Specify the community score, which you want to add to the event. |
First Submission | String | N/A | No | Specify first submission of the event. |
Last Submission | String | N/A | No | Specify last submission of the event. |
Run On
This action runs on all entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If success : "Successfully created new Virustotal-Report object for event with {0} {1} in MISP.".format(ID/UUID, event_id) If not success : "Action wasn't able to created Virustotal-Report object for event with {0} {1} in MISP. Reason: {2}".format(ID/UUID) Critical Error (fail action) "Error executing action "Create Virustotal-Report Misp Object". Reason: {0}".format(stacktrace) Event ID is not found (fail action) "Error executing action "Create Virustotal-Report Misp Object". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
List Event Objects
Description
Retrieve information about available objects in MISP event.
Parameters
Parameter Display Name | Type | Default Value | Is mandatory | Description |
---|---|---|---|---|
Event ID | String | N/A | Yes | Specify a comma-separated list of IDs and UUIDs of the events, for which you want to retrieve details. |
Max Objects to Return | Integer | 50 | No | Specify how many objects to return. |
Run On
This action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
JSON Result
"Object": [
{
"id": "1",
"name": "ftm-Associate",
"meta-category": "followthemoney",
"description": "Non-family association between two people",
"template_uuid": "6119ecb3-dedd-44b6-b88f-174585b0b1bf",
"template_version": "1",
"event_id": "1",
"uuid": "2a3e260f-d3b2-4164-b2b1-2f6f5b559970",
"timestamp": "1594632232",
"distribution": "5",
"sharing_group_id": "0",
"comment": "",
"deleted": false,
"first_seen": null,
"last_seen": null,
"ObjectReference": [],
},
{
"id": "2",
"name": "ftm-Associate",
"meta-category": "followthemoney",
"description": "Non-family association between two people",
"template_uuid": "6119ecb3-dedd-44b6-b88f-174585b0b1bf",
"template_version": "1",
"event_id": "1",
"uuid": "800d8634-175a-4bc2-a4d7-aca200c8c132",
"timestamp": "1594632463",
"distribution": "5",
"sharing_group_id": "0",
"comment": "",
"deleted": false,
"first_seen": null,
"last_seen": null,
"ObjectReference": [],
}
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | The action should not fail nor stop a playbook execution: If at least object found for 1 event: "Successfully listed objects for the following events: \n{0}".format(event_ids) If event with specified id was not found (is_success = false): If no object found for 1 event: "Action wasn't able to find objects for the following events:\n {0}".format(event_ids) If no object found for all events: "No objects were found for the provided events." The action should fail and stop a playbook execution: if fatal error, like wrong credentials, no connection to server, other: print "Error executing action "List Event Objects". Reason: {0}''.format(error.Stacktrace) |
General |
CSV Table | Table name: Event {0} Objects Table Columns:
|
Get Event Details
Description
Retrieve details about events in MISP.
Parameters
Parameter Display Name | Type | Is Mandatory | Description |
---|---|---|---|
Event ID | String | Yes | Specify a comma-separated list of IDs or UUIDs of the events for which you want retrieve details. |
Return Attributes Info | Checkbox | Checked | If enabled, action will create a case wall table for all of the attributes that are a part of the event. |
Run On
This action doesn't run on entities.
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | The action should not fail nor stop a playbook execution: If action completed successfully for at least one of the provided ids: Print "Successfully retrieved information for the following events: <>" If action failed to run for at least one of the provided incident ids: Print "Failed to retrieved information for the following events: <> The action should fail and stop a playbook execution: The action should fail and stop a playbook execution: if fatal error, like wrong credentials, no connection to server, other: print "Error executing action "List Event Objects". Reason: {0}''.format(error.Stacktrace) |
General |
CSV Table | Table Name: Event {0} Attributes Details".format(event_id) Columns:
|
List Sightings of an Attribute
Description
List available sightings for attributes in MISP.
Parameters
Parameter Name | Type | Default Value | Mandatory | Description |
---|---|---|---|---|
Attribute Name | CSV | No | Specify a comma-separated list of attribute identifiers for which you want to list sightings. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values. | |
Event ID | String | No | Specify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event". | |
Category | CSV | No | Specify a comma-separated list of categories. If specified, action will only list sightings for attributes that have matching category. If nothing is specified, action will ignore categories in attributes. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation. | |
Type | CSV | No | Specify a comma-separated list of attribute types. If specified, action will only list sightings for attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. Example values: md5, sha1, ip-src, ip-dst | |
Attribute Search | DDL | Provided Event Possible values: All Events |
Yes | Specify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and list sightings for all attributes that match our criteria. |
Attribute UUID | CSV | No | Specify a comma-separated list of attribute UUIDs for which you want to list sightings. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values. |
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
is_success | True/False | is_success:False |
Case Wall
Result type | Value/Description | Type |
---|---|---|
Output message* | If successfully listed sightings to at least one attribute: "Successfully listed sightings for the following attributes in MISP:\n{0}".format(attribute name/attribute UUID) if not successfully listed sightings for at least one attribute: "Action didn't list sightings for the following attributes in MISP:\n{0}".format(attribute name/attribute UUID) If not successful for all or no sightings for all attributes: "No sightings were found for the provided attributes in MISP" Critical Error (fail action) "Error executing action "List Sightings of an Attribute". Reason: {0}".format(stacktrace) If invalid parameter is specified in "Category" (fail action): "Error executing action "List Sightings of an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation". If "Provided Event" is selected, but Event ID is not selected: "Error executing action "List Sightings of an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"". |
General |
Set IDS Flag for an Attribute
Description
Set IDS flag for attributes in MISP.
Parameters
Parameter Name | Type | Default Value | Mandatory | Description |
---|---|---|---|---|
Attribute Name | CSV | No | Specify a comma-separated list of attribute identifiers for which you want to set an IDS flag. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values. | |
Event ID | String | No | Specify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event". | |
Category | CSV | No | Specify a comma-separated list of categories. If specified, action will only set IDS flag for attributes that have matching category. If nothing is specified, action will ignore categories in attributes. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation. | |
Type | CSV | No | Specify a comma-separated list of attribute types. If specified, action will only set IDS flag for attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. Example values: md5, sha1, ip-src, ip-dst | |
Attribute Search | DDL | Provided Event Possible values: All Events |
Yes | Specify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and set IDS flag for all attributes that match our criteria. |
Attribute UUID | CSV | No | Specify a comma-separated list of attribute UUIDs for which you want to set an IDS flag. |
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success | True/False | success:False |
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If successfully added IDS flag to at least one attribute: "Successfully set IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID) if not successfully added IDS flag to at least one attribute: "Action didn't set IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID) If not successful for all: "IDS flag was not set for the provided attributes in MISP" Critical Error (fail action) "Error executing action "Set IDS Flag for an Attribute". Reason: {0}".format(stacktrace) If invalid parameter is specified in "Category" (fail action): "Error executing action "Set IDS Flag for an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation". If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Set IDS Flag for an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"". Event ID is not found (fail action) "Error executing action "Set IDS Flag for an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Unset IDS Flag for an Attribute
Description
Unset IDS flag for attributes in MISP.
Parameters
Name | Type | Default Value | Mandatory | Description |
---|---|---|---|---|
Attribute Name | CSV | No | Specify a comma-separated list of attribute identifiers for which you want to unset an IDS flag. |
|
Event ID | String | No | Specify the ID or UUID of the event, where to search for attributes. This parameter is required, if "Attribute Search" is set to "Provided Event". | |
Category | CSV | No | Specify a comma-separated list of categories. If specified, action will only unset IDS flag for attributes that have matching category. If nothing is specified, action will ignore categories in attributes. Possible values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation. | |
Type | CSV | No | Specify a comma-separated list of attribute types. If specified, action will only unset IDS flag for attributes that have matching attribute type. If nothing is specified, action will ignore types in attributes. Example values: md5, sha1, ip-src, ip-dst | |
Attribute Search | DDL | Provided Event Possible values: All Events |
True | Specify, where action should search for attributes. If "Provided Event" is selected, action will only search for attributes or attribute UUIDs in event with ID/UUID provided in "Event ID" parameter. If "All Events", action will search for attributes among all events and unset IDS flag for all attributes that match our criteria. |
Attribute UUID | CSV | No | Specify a comma-separated list of attribute UUIDs for which you want to unset an IDS flag. Note: If both "Attribute Name" and "Attribute UUID" are specified, action will work with "Attribute UUID" values. |
Action Results
Script Result
Script Result Name | Value Options | Example |
---|---|---|
success | True/False | success:False |
Case Wall
Result Type | Value Description | Type |
---|---|---|
Output message* | If successfully removed IDS flag to at least one attribute: "Successfully unset IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID) if not successfully removed IDS flag to at least one attribute: "Action didn't unset IDS flag for the following attributes in MISP:\n{0}".format(attribute name/object UUID) If not successful for all: "IDS flag was not unset for the provided attributes in MISP" Critical Error (fail action) "Error executing action "Unset IDS Flag for an Attribute". Reason: {0}".format(stacktrace) If invalid parameter is specified in "Category" (fail action): "Error executing action "Unset IDS Flag for an Attribute". Reason: Invalid value was provided for the parameter "Category". Acceptable values: External Analysis, Payload Delivery, Artifacts Dropped, Payload Installation". If "Provided Event" is selected, but Event ID is not selected: "Error executing action "Unset IDS Flag for an Attribute". Reason: Event ID needs to be provided, if "Provided Event" is selected for the parameter "Attribute Search"". Event ID is not found (fail action) "Error executing action "Unset IDS Flag for an Attribute". Reason: Event with {0} {1} was not found in MISP".format(ID/UUID, event_id) |
General |
Connector
MISP - Attributes Connector
Description
Pull attributes from MISP.
Configure MISP - Attributes Connector on Google Security Operations SOAR
For detailed instructions on how to configure a connector in Google Security Operations SOAR, see Configuring the connector.
Connector parameters
Use the following parameters to configure the connector:
Param Name | Type | Default Value | Is Mandatory | Description |
---|---|---|---|---|
DeviceProductField | String | Product Name | Yes | Enter the source field name in order to retrieve the Product Field name. |
EventClassId | String | alertType | Yes | Enter the source field name in order to retrieve the Event Field name. |
PythonProcessTimeout | Integer | 180 | Yes | Timeout limit for the python process running the current script. |
API Root | String | N/A | Yes | API Root for MISP account. |
API Key | Password | Yes | API Key of the MISP account. | |
Fetch Max Hours Backwards | Integer | 1 | No | Amount of hours from where to fetch attributes. |
Max Attributes Per Cycle | Integer | 50 | Yes | How many attributes to process per one connector iteration. |
Lowest Threat Level To Fetch | Integer | 1 | Yes | Lowest severity that will be used to fetch alerts. Possible values: 1-4. |
Attribute Type Filter | String | No | Filter attributes by their type, comma separated. If provided, only attributes with whitelisted type will be processed. | |
Category Filter | String | No | Filter attributes by their category, comma separated. If provided, only attributes with whitelisted category will be processed. | |
Galaxy Filter | String | No | Filter attributes by their parent event's galaxy, comma separated. If provided, only attributes that belong to an event with a whitelisted galaxy will be processed. | |
Verify SSL | Checkbox | Yes | If enabled, verify the SSL certificate for the connection to the CheckPoint Cloud Guard server is valid. | |
Environment Field Name | String | No | Describes the name of the field where the environment name is stored. If the environment field isn't found, the environment is the default environment. | |
Environment Regex Pattern | String | .* | No | A regex pattern to run on the value found in the \"Environment Field Name\" field. Default is .* to catch all and return the value unchanged. Used to allow the user to manipulate the environment field via regex logic. If the regex pattern is null or empty, or the environment value is null, the final environment result is the default environment. |
Proxy Server Address | String | No | The address of the proxy server to use. | |
Proxy Username | String | No | The proxy username to authenticate with. | |
Proxy Password | Password | No | The proxy password to authenticate with. |