threatintel.misp
Introduction
The tags beginning with threatintel.misp
identify events generated by MISP Threat Sharing belonging to MISP Standard Collaborative Intelligence.
Valid tags and data tablesÂ
The full tag must have at least 3 levels. The first two are fixed as threatintel.misp
. The third level identifies the type of events sent and the fourth indicates the event subtypes.
These are the valid tags and corresponding data tables that will receive the parsers' data:
Product / Service | Tags | Data tables |
---|---|---|
MISP Threat Sharing |
|
|
|
| |
|
| |
|
|
For more information, read more About Devo tags.
Table structure
These are the fields displayed in these tables:
threatintel.misp.attributenotifications
Field | Type | Extra fields |
---|---|---|
eventdate |
| Â |
hostname |
| Â |
attribute_id |
| Â |
attribute_event_id |
| Â |
attribute_object_id |
| Â |
attribute_object_relation |
| Â |
attribute_category |
| Â |
attribute_type |
| Â |
attribute_value1 |
| Â |
attribute_value2 |
| Â |
attribute_to_ids |
| Â |
attribute_uuid |
| Â |
attribute_timestamp |
| Â |
attribute_distribution |
| Â |
attribute_sharing_group_id |
| Â |
attribute_comment |
| Â |
attribute_deleted |
| Â |
attribute_disable_correlation |
| Â |
attribute_value |
| Â |
attribute_sighting |
| Â |
event_id |
| Â |
event_date |
| Â |
event_info |
| Â |
event_uuid |
| Â |
event_published |
| Â |
event_analysis |
| Â |
event_threat_level_id |
| Â |
event_org_id |
| Â |
event_ref_orgc_id |
| Â |
event_distribution |
| Â |
event_sharing_group_id |
| Â |
event_orgc_id |
| Â |
event_orgc_uuid |
| Â |
event_orgc_name |
| Â |
action |
| Â |
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| ✓ |
threatintel.misp.attributes
Field | Type | Field Transformation | Source field name | Extra fields |
---|---|---|---|---|
eventdate |
| Â | Â | Â |
hostname |
| Â | Â | Â |
attribute_id |
| Â | Â | Â |
attribute_event_id |
| Â | Â | Â |
attribute_object_id |
| Â | Â | Â |
attribute_object_relation |
| Â | Â | Â |
attribute_category |
| Â | Â | Â |
attribute_type |
| Â | Â | Â |
attribute_value1 |
| Â | Â | Â |
attribute_value2 |
| Â | Â | Â |
attribute_to_ids |
| Â | Â | Â |
attribute_uuid |
| Â | Â | Â |
attribute_timestamp |
| Â | Â | Â |
attribute_distribution |
| Â | Â | Â |
attribute_sharing_group_id |
| Â | Â | Â |
attribute_comment |
| Â | Â | Â |
attribute_deleted |
| Â | Â | Â |
attribute_disable_correlation |
| Â | Â | Â |
attribute_value |
| Â | Â | Â |
attribute_sighting |
| Â | Â | Â |
attribute_tag |
| Â | Â | Â |
event_id |
| Â | Â | Â |
event_date |
| Â | Â | Â |
event_info |
| Â | Â | Â |
event_uuid |
| Â | Â | Â |
event_published |
| Â | Â | Â |
event_analysis |
| Â | Â | Â |
event_threat_level_id |
| Â | Â | Â |
event_org_id |
| Â | Â | Â |
event_orgc_id |
| Â | Â | Â |
event_distribution |
| Â | Â | Â |
event_sharing_group_id |
| Â | Â | Â |
event_ref_orgc_id |
| Â | Â | Â |
event_orgc_uuid |
| Â | Â | Â |
event_orgc_name |
| Â | Â | Â |
event_tag |
| Â | Â | Â |
event_publish_timestamp |
| Â | Â | Â |
action |
| Â | Â | Â |
object_id |
| Â | Â | Â |
object_name |
| Â | Â | Â |
object_meta_category |
| Â | Â | Â |
object_description |
| Â | Â | Â |
object_template_uuid |
| Â | Â | Â |
object_template_version |
| Â | Â | Â |
object_event_id |
| Â | Â | Â |
object_uuid |
| Â | Â | Â |
object_timestamp |
| Â | Â | Â |
object_distribution |
| Â | Â | Â |
object_sharing_group_id |
| Â | Â | Â |
object_comment |
| Â | Â | Â |
object_deleted |
| Â | Â | Â |
object_first_seen |
| Â | Â | Â |
object_last_seen |
| Â | Â | Â |
eventtags_id_str |
| join(eventtags_id, ',') | eventtags_id | Â |
eventtags_name_str |
| join(eventtags_name, ',') | eventtags_name | Â |
eventtags_colour_str |
| join(eventtags_colour, ',') | eventtags_colour | Â |
eventtags_exportable_str |
| eventtags_exportable | Â | |
eventtags_org_id_str |
| eventtags_org_id | Â | |
eventtags_user_id_str |
| eventtags_user_id | Â | |
eventtags_hide_tag_str |
| eventtags_hide_tag | Â | |
eventtags_numerical_value_str |
| eventtags_numerical_value | Â | |
hostchain |
|  |  | ✓ |
tag |
|  |  | ✓ |
rawMessage |
|  |  | ✓ |
threatintel.misp.sighting.attributes
Field | Type | Extra fields |
---|---|---|
eventdate |
| Â |
hostname |
| Â |
eventdate_instance |
| Â |
level |
| Â |
trace |
| Â |
namespace |
| Â |
value |
| Â |
first_seen |
| Â |
last_seen |
| Â |
consensus |
| Â |
count |
| Â |
tags |
| Â |
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| Â |
threatintel.misp.sighting.logs
Field | Type | Extra fields |
---|---|---|
eventdate |
| Â |
hostname |
| Â |
eventdate_instance |
| Â |
level |
| Â |
trace |
| Â |
message |
| Â |
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| Â |