Integrations
- Integrations
- 1Password
- Abnormal
- Absolute
- AbuseIPDB
- Adaptive Shield
- Adobe Cloud
- ADP
- Agari Phishing Response
- Airlock
- Airlock Digital
- Akamai Identity Cloud Social
- Alert Logic
- AlgoSec Firewall Analyzer
- AlienVault OTX
- AlienVault USM
- Anodot
- Ansible
- Anvilogic
- Any Run
- Apex One
- ArcSight ESM
- Area 1
- Asana
- Asset Panda
- Atlassian User Management
- Atlassian User Provisioning
- auth0
- Authentik
- Authomize
- Automox
- AWS
- AWS IAM Identity Center
- Axonius
- Azure
- Azure Data Explorer
- Azure DevOps
- Azure Log Analytics
- Azure Storage
- BambooHR
- Big Fix
- BigPanda
- Bitbucket
- Bitdefender
- Bitsight
- Bitwarden
- Black Duck
- Black Kite
- Blink
- BMC Remedy
- Box
- Brinqa
- Cato Networks
- Censys
- Check Point Harmony
- Check Point Infinity Events
- Check Point XDR-XPR
- Check Point Management
- Checkmarx One
- Checkmarx SAST
- Chorus
- Chronicle
- Cisco Advanced Phishing Protection
- Cisco Domain Protection
- Cisco Meraki
- Cisco Talos
- Cisco Umbrella
- Cisco Webex
- Claroty xDome
- ClearPass
- ClickHouse
- ClickUp
- Cloud Custodian
- Cloudflare
- Cobalt
- Compass
- Confluence
- Confluence Data Center
- Coralogix
- Coralogix Incident Management
- Cortex XDR
- Cortex Xpanse
- CredStash
- Cribl
- CrowdStrike
- CyberArk
- Cybersixgill
- CyCognito
- Cyera
- Cylance
- Cyware CTIX
- Darktrace
- Dasera
- Databricks
- Datadog
- DataSet
- Delighted
- Delinea
- Devo
- Discord
- Docusign
- Domo
- Drata
- Dropbox
- Dropbox Business
- Druva
- Duo
- Duo Auth
- Dynatrace
- EasyVista
- EchoTrail
- Egnyte
- Egnyte Secure Govern
- Elasticsearch
- Entro
- Ermetic
- Exabeam
- Exchange Online
- Expel
- F5 BIG IP
- Falcon LogScale
- Falcon Surface
- Flare.io
- Forcepoint DLP
- Forescout
- FortiGate
- Freshservice
- GCP
- Ghostwriter
- Git
- GitHub
- GitLab
- Glean
- Gmail
- Google Calendar
- Google Chat
- Google Docs
- Google Drive
- Google Forms
- Google Looker
- Google Meet
- Google Sheets
- Google Workspace
- Grafana
- Grip Security
- GYTPOL
- Have I Been Pwned
- HiBob
- HubSpot
- Hunters
- Hybrid Analysis
- Hyperproof
- IBM Cloud
- IBM NS1 Connect
- IBM X Force
- Imperva
- incident.io
- Infoblox Cloud Services Portal
- Integrations
- Intercom
- Intezer
- IP API
- IPinfo
- IPWHOIS
- Ironscales
- Ivanti RiskSense
- Jamf
- JetBrains
- JFrog
- Jira
- Jira Data Center
- Joe Sandbox
- JumpCloud
- Kandji
- Keeper Secrets Manager
- Kenna Security
- KnowBe4
- KnowBe4 Events
- Kubernetes
- Lacework
- LaunchDarkly
- Linear
- Litmos
- LogicMonitor
- LogRhythm
- Manage Engine ServiceDesk Plus
- Mattermost
- Maven
- Microsoft Defender For Cloud
- Microsoft Defender For Cloud Apps
- Microsoft Defender For Endpoints
- Microsoft Defender XDR
- Microsoft E-Discovery
- Microsoft Entra ID
- Microsoft Graph
- Microsoft Intune
- Microsoft Office 365 Management Activity
- Microsoft Outlook
- Microsoft Purview
- Microsoft Sentinel
- Microsoft SQL Server
- Microsoft Teams
- Mimecast
- MISP
- Monday
- MongoDB Atlas
- MxToolbox
- Neo4j
- NetBox
- Netography
- Netskope
- New Relic
- Nightfall AI
- NinjaOne
- Notion
- Nozomi Networks
- Nuclei
- Nucleus
- Nutanix Hypervisor
- Obsidian
- Okta
- OneDrive
- OneLogin
- OneTrust
- OpenAI
- OpenCTI
- Opsgenie
- OPSWAT
- Oracle Cloud
- Oracle HCM
- Orca Security
- OWASP ZAP
- PagerDuty
- Palo Alto Cloud NGFW
- Palo Alto Firewall
- Panther
- Pentera
- Perception Point
- PhishLabs
- PhishLabs Incident Data
- PhishLabs Open Web Monitoring
- Pingdom
- PingID
- PingOne
- PlexTrac
- PortSwigger
- Postman
- Postman SCIM
- Power BI
- PowerShell
- Prisma Access
- Prisma Cloud CSPM
- Prisma Cloud CWP
- Prometheus
- Proofpoint
- Proofpoint ITM
- Proofpoint Protection Server
- Proofpoint Security Awareness Training
- Proofpoint TAP
- Proofpoint Threat Response Auto Pull
- Pub-Sub
- QRadar
- Qualys
- Rapid7
- Rapid7 InsightIDR
- Rapid7 InsightVM Cloud
- Rapid7 Threat Command
- Reco
- Recorded Future
- Red Hat IdM
- Rippling
- runZero
- SafeBase
- Sage HR
- SailPoint
- SailPoint IdentityIQ
- Salesforce
- SAP Ariba
- ScienceLogic
- Securin
- Securin VI
- SecurityScorecard
- Securonix
- SemGrep
- SentinelOne
- ServiceNow
- SharePoint
- Shodan
- Shopify
- Silverfort
- Slack
- Smartsheet
- Snipe-IT
- Snowflake
- Snyk
- SolarWinds Service Desk
- SonarQube
- Sophos
- Split
- Splunk
- Splunk Observability
- Splunk SOAR
- Spur
- StrongDM
- Sumo Logic
- Symantec EDR
- Sysdig
- Tableau
- Tanium
- TeamCity
- TeamViewer
- Telegram
- Tenable
- Tenable Security Center
- Terraform
- Terraform Cloud
- TheHive
- Thinkst Canary
- ThreatQuotient
- Trellix Email Security
- Trello
- Trend Vision One
- Twilio
- UKG HR
- Uptycs
- URLScan
- Vault
- Veracode
- Verkada
- Vertica
- VirusTotal
- VMware Carbon Black
- VMware vSphere
- WeChat
- WhatsApp
- Whois
- WildFire
- Wiz
- Workday
- Workspace ONE UEM
- YesWeHack
- Zendesk
- Zero Networks
- Zoom
- Zscaler Internet Access
- Zscaler Private Access
Actions
Search Events
Search events.
To learn more, visit the MISP documentation.
Basic Parameters
Parameter | Description |
---|---|
Attribute | Filter events matching the given string with attributes values. |
Direction | Direction of the sort. |
Filter events by matching the event creator user email. | |
Event ID | The ID of the event. Must be equal or under 10 characters. |
Minimal | Returns a minimal version of the event.Note : only events with attributeCount > 0 will be returned. |
Organisation | Filter events by matching the creator organisation name. |
Sort | Field to be used to sort the result. |
Threat Level | Represents the threat level. |
Advanced Parameters
Parameter | Description |
---|---|
Analysis State | Represents the threat level. |
Distribution | Who will be able to see this event once it becomes published and eventually when it becomes pulled. |
Event Info | Filter events by matching the event info text. |
From Date | Returns events that in which creation date is greater or equal. |
Has Proposal | Filter events by checking if it has attributes with change proposals. |
Limit | Limit search filter. Must be greater or equal to 0. |
Page | Page number. Must be greater or equal to 1. |
Search Date From | Filter attributes in which creation date is greater or equal. |
Search Date Until. | Filter attributes that in which creation date is less or equal. |
Sharing Group ID | The sharing group of the events. Must be equal or under 10 characters. |
Start Publish Timestamp | Event publish timestamp greater or equal. |
Start Timestamp | Event timestamp greater or equal. |
Tag | The tag of the events. Must be equal or under 255 characters. |
Tags | Filter events by matching any of the event tags of a given list of tag names. |
Until date | Returns events that in which creation date is less or equal. |
Example Output
[ { "id": "12345", "org_id": "12345", "distribution": "0", "info": "logged source ip", "orgc_id": "12345", "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "date": "1991-01-15", "published": false, "analysis": "0", "attribute_count": "321", "timestamp": "1617875568", "sharing_group_id": "1", "proposal_email_lock": true, "locked": true, "threat_level_id": "1", "publish_timestamp": "1617875568", "sighting_timestamp": "1617875568", "disable_correlation": false, "extends_uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "event_creator_email": "user@example.com", "Feed": { "id": "3", "name": "CIRCL OSINT Feed", "provider": "CIRCL", "url": "https://www.circl.lu/doc/misp/feed-osint", "rules": "{\"tags\":{\"OR\":[],\"NOT\":[]},\"orgs\":{\"OR\":[],\"NOT\":[]},\"url_params\":\"\"}", "enabled": true, "distribution": "0", "sharing_group_id": "1", "tag_id": "12345", "default": true, "source_format": "1", "fixed_event": true, "delta_merge": true, "event_id": "12345", "publish": false, "override_ids": true, "settings": "{\"csv\":{\"value\":\"\",\"delimiter\":\"\"},\"common\":{\"excluderegex\":\"\"},\"disable_correlation\":\"1\"}", "input_source": "local", "delete_local_file": true, "lookup_visible": true, "headers": "X-Custom-Header-A: Foo\nX-Custom-Header-B: Bar\n", "caching_enabled": true, "force_to_ids": true, "orgc_id": "12345", "cache_timestamp": "1617875568" }, "Org": { "id": "12345", "name": "ORGNAME", "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b" }, "Orgc": { "id": "12345", "name": "ORGNAME", "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b" }, "Attribute": [ { "id": "12345", "event_id": "12345", "object_id": "12345", "object_relation": "sensor", "category": "Internal reference", "type": "md5", "value": "127.0.0.1", "to_ids": true, "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "timestamp": "1617875568", "distribution": "0", "sharing_group_id": "1", "comment": "logged source ip", "deleted": false, "disable_correlation": false, "first_seen": "1581984000000000", "last_seen": "1581984000000000" } ], "ShadowAttribute": [ { "id": "12345", "event_id": "12345", "object_id": "12345", "object_relation": "sensor", "category": "Internal reference", "type": "md5", "value": "127.0.0.1", "to_ids": true, "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "timestamp": "1617875568", "distribution": "0", "sharing_group_id": "1", "comment": "logged source ip", "deleted": false, "disable_correlation": false, "first_seen": "1581984000000000", "last_seen": "1581984000000000" } ], "RelatedEvent": [ {} ], "Galaxy": [ { "id": "12345", "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "name": "Ransomware", "type": "ransomware", "description": "Ransomware galaxy based on ...", "version": "1", "icon": "globe", "namespace": "misp", "kill_chain_order": { "fraud-tactics": [ "Initiation", "Target Compromise", "Perform Fraud", "Obtain Fraudulent Assets", "Assets Transfer", "Monetisation" ] } } ], "Object": [ { "id": "12345", "name": "ail-leak", "meta-category": "string", "description": "string", "template_uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "template_version": "1", "event_id": "12345", "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "timestamp": "1617875568", "distribution": "0", "sharing_group_id": "1", "comment": "string", "deleted": true, "first_seen": "1581984000000000", "last_seen": "1581984000000000", "Attribute": [ { "id": "12345", "event_id": "12345", "object_id": "12345", "object_relation": "sensor", "category": "Internal reference", "type": "md5", "value": "127.0.0.1", "to_ids": true, "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "timestamp": "1617875568", "distribution": "0", "sharing_group_id": "1", "comment": "logged source ip", "deleted": false, "disable_correlation": false, "first_seen": "1581984000000000", "last_seen": "1581984000000000" } ] } ], "EventReport": [ { "id": "12345", "uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b", "event_id": "12345", "name": "Report of the incident", "content": "string", "distribution": "0", "sharing_group_id": "1", "timestamp": "1617875568", "deleted": false } ], "Tag": [ { "id": "12345", "name": "tlp:white", "colour": "#ffffff", "exportable": true, "org_id": "12345", "user_id": "12345", "hide_tag": false, "numerical_value": "12345", "is_galaxy": true, "is_custom_galaxy": true, "inherited": 1 } ] }]
Workflow Library Example
Search Events with Misp and Send Results Via Email
Preview this Workflow on desktop
Was this page helpful?
Assistant
Responses are generated using AI and may contain mistakes.