Get a list of events.

External Documentation

To learn more, visit the MISP documentation.

Example Output

[
	{
		"id": "12345",
		"org_id": "12345",
		"distribution": "0",
		"info": "logged source ip",
		"orgc_id": "12345",
		"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
		"date": "1991-01-15",
		"published": false,
		"analysis": "0",
		"attribute_count": "321",
		"timestamp": "1617875568",
		"sharing_group_id": "1",
		"proposal_email_lock": true,
		"locked": true,
		"threat_level_id": "1",
		"publish_timestamp": "1617875568",
		"sighting_timestamp": "1617875568",
		"disable_correlation": false,
		"extends_uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
		"event_creator_email": "user@example.com",
		"Feed": {
			"id": "3",
			"name": "CIRCL OSINT Feed",
			"provider": "CIRCL",
			"url": "https://www.circl.lu/doc/misp/feed-osint",
			"rules": "{\"tags\":{\"OR\":[],\"NOT\":[]},\"orgs\":{\"OR\":[],\"NOT\":[]},\"url_params\":\"\"}",
			"enabled": true,
			"distribution": "0",
			"sharing_group_id": "1",
			"tag_id": "12345",
			"default": true,
			"source_format": "1",
			"fixed_event": true,
			"delta_merge": true,
			"event_id": "12345",
			"publish": false,
			"override_ids": true,
			"settings": "{\"csv\":{\"value\":\"\",\"delimiter\":\"\"},\"common\":{\"excluderegex\":\"\"},\"disable_correlation\":\"1\"}",
			"input_source": "local",
			"delete_local_file": true,
			"lookup_visible": true,
			"headers": "X-Custom-Header-A: Foo\nX-Custom-Header-B: Bar\n",
			"caching_enabled": true,
			"force_to_ids": true,
			"orgc_id": "12345",
			"cache_timestamp": "1617875568"
		},
		"Org": {
			"id": "12345",
			"name": "ORGNAME",
			"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b"
		},
		"Orgc": {
			"id": "12345",
			"name": "ORGNAME",
			"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b"
		},
		"Attribute": [
			{
				"id": "12345",
				"event_id": "12345",
				"object_id": "12345",
				"object_relation": "sensor",
				"category": "Internal reference",
				"type": "md5",
				"value": "127.0.0.1",
				"to_ids": true,
				"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
				"timestamp": "1617875568",
				"distribution": "0",
				"sharing_group_id": "1",
				"comment": "logged source ip",
				"deleted": false,
				"disable_correlation": false,
				"first_seen": "1581984000000000",
				"last_seen": "1581984000000000"
			}
		],
		"ShadowAttribute": [
			{
				"id": "12345",
				"event_id": "12345",
				"object_id": "12345",
				"object_relation": "sensor",
				"category": "Internal reference",
				"type": "md5",
				"value": "127.0.0.1",
				"to_ids": true,
				"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
				"timestamp": "1617875568",
				"distribution": "0",
				"sharing_group_id": "1",
				"comment": "logged source ip",
				"deleted": false,
				"disable_correlation": false,
				"first_seen": "1581984000000000",
				"last_seen": "1581984000000000"
			}
		],
		"RelatedEvent": [
			{}
		],
		"Galaxy": [
			{
				"id": "12345",
				"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
				"name": "Ransomware",
				"type": "ransomware",
				"description": "Ransomware galaxy based on ...",
				"version": "1",
				"icon": "globe",
				"namespace": "misp",
				"kill_chain_order": {
					"fraud-tactics": [
						"Initiation",
						"Target Compromise",
						"Perform Fraud",
						"Obtain Fraudulent Assets",
						"Assets Transfer",
						"Monetisation"
					]
				}
			}
		],
		"Object": [
			{
				"id": "12345",
				"name": "ail-leak",
				"meta-category": "string",
				"description": "string",
				"template_uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
				"template_version": "1",
				"event_id": "12345",
				"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
				"timestamp": "1617875568",
				"distribution": "0",
				"sharing_group_id": "1",
				"comment": "string",
				"deleted": true,
				"first_seen": "1581984000000000",
				"last_seen": "1581984000000000",
				"Attribute": [
					{
						"id": "12345",
						"event_id": "12345",
						"object_id": "12345",
						"object_relation": "sensor",
						"category": "Internal reference",
						"type": "md5",
						"value": "127.0.0.1",
						"to_ids": true,
						"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
						"timestamp": "1617875568",
						"distribution": "0",
						"sharing_group_id": "1",
						"comment": "logged source ip",
						"deleted": false,
						"disable_correlation": false,
						"first_seen": "1581984000000000",
						"last_seen": "1581984000000000"
					}
				]
			}
		],
		"EventReport": [
			{
				"id": "12345",
				"uuid": "c99506a6-1255-4b71-afa5-7b8ba48c3b1b",
				"event_id": "12345",
				"name": "Report of the incident",
				"content": "string",
				"distribution": "0",
				"sharing_group_id": "1",
				"timestamp": "1617875568",
				"deleted": false
			}
		],
		"Tag": [
			{
				"id": "12345",
				"name": "tlp:white",
				"colour": "#ffffff",
				"exportable": true,
				"org_id": "12345",
				"user_id": "12345",
				"hide_tag": false,
				"numerical_value": "12345",
				"is_galaxy": true,
				"is_custom_galaxy": true,
				"inherited": 1
			}
		]
	}
]

Workflow Library Example

Get Events with Misp and Send Results Via Email

Preview this Workflow on desktop