MISP / PyMISP

Python library using the MISP Rest API
Other
445 stars 280 forks source link

Getting "Could not save the attribute" when adding atribute #173

Closed kdeltared closed 6 years ago

kdeltared commented 6 years ago

Hi,

Im executing this code from python console and the event is being created into misp without attribute. When executing the add_domain_ip the console returns [{'message': 'Could not save the attribute. ', 'url': '/attributes/add/1934', 'name': 'Could not save the attribute. '}]

from pymisp import PyMISP
url = 'https://192.168.0.1/'
key = 'xxxxxxxxxxx'
misp_verifycert = False

misp = PyMISP(url, key, misp_verifycert, 'json')

event = misp.new_event(0, 1, 0,"test_1")

misp.add_domain_ip(event, "something.com", "200.200.200.200")

Any idea?

Thank you!

Rafiot commented 6 years ago

I just tested and or worked for me.

Can you enable debug: misp = PyMISP(url, key, misp_verifycert, 'json', debug=True)

kdeltared commented 6 years ago

This is the output with debug=True

/usr/lib/python3/dist-packages/urllib3/connectionpool.py:794: InsecureRequestWarning: Unverified HTTPS request is being made. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.org/en/latest/security.html
  InsecureRequestWarning)
{
    "version": "2.4.68"
}
{
    "result": {
        "categories": [
            "Internal reference",
            "Targeting data",
            "Antivirus detection",
            "Payload delivery",
            "Artifacts dropped",
            "Payload installation",
            "Persistence mechanism",
            "Network activity",
            "Payload type",
            "Attribution",
            "External analysis",
            "Financial fraud",
            "Support Tool",
            "Social network",
            "Person",
            "Other"
        ],
        "category_type_mappings": {
            "Antivirus detection": [
                "link",
                "comment",
                "text",
                "attachment",
                "other"
            ],
            "Persistence mechanism": [
                "filename",
                "regkey",
                "regkey|value",
                "comment",
                "text",
                "other"
            ],
            "Artifacts dropped": [
                "md5",
                "sha1",
                "sha224",
                "sha256",
                "sha384",
                "sha512",
                "sha512/224",
                "sha512/256",
                "ssdeep",
                "imphash",
                "impfuzzy",
                "authentihash",
                "filename",
                "filename|md5",
                "filename|sha1",
                "filename|sha224",
                "filename|sha256",
                "filename|sha384",
                "filename|sha512",
                "filename|sha512/224",
                "filename|sha512/256",
                "filename|authentihash",
                "filename|ssdeep",
                "filename|tlsh",
                "filename|imphash",
                "filename|impfuzzy",
                "filename|pehash",
                "regkey",
                "regkey|value",
                "pattern-in-file",
                "pattern-in-memory",
                "pdb",
                "yara",
                "attachment",
                "malware-sample",
                "named pipe",
                "mutex",
                "windows-scheduled-task",
                "windows-service-name",
                "windows-service-displayname",
                "comment",
                "text",
                "x509-fingerprint-sha1",
                "other"
            ],
            "Payload installation": [
                "md5",
                "sha1",
                "sha224",
                "sha256",
                "sha384",
                "sha512",
                "sha512/224",
                "sha512/256",
                "ssdeep",
                "imphash",
                "impfuzzy",
                "authentihash",
                "pehash",
                "tlsh",
                "filename",
                "filename|md5",
                "filename|sha1",
                "filename|sha224",
                "filename|sha256",
                "filename|sha384",
                "filename|sha512",
                "filename|sha512/224",
                "filename|sha512/256",
                "filename|authentihash",
                "filename|ssdeep",
                "filename|tlsh",
                "filename|imphash",
                "filename|impfuzzy",
                "filename|pehash",
                "pattern-in-file",
                "pattern-in-traffic",
                "pattern-in-memory",
                "yara",
                "vulnerability",
                "attachment",
                "malware-sample",
                "malware-type",
                "comment",
                "text",
                "x509-fingerprint-sha1",
                "mobile-application-id",
                "other"
            ],
            "Network activity": [
                "ip-src",
                "ip-dst",
                "ip-dst|port",
                "ip-src|port",
                "hostname",
                "domain",
                "domain|ip",
                "email-dst",
                "url",
                "uri",
                "user-agent",
                "http-method",
                "AS",
                "snort",
                "pattern-in-file",
                "pattern-in-traffic",
                "attachment",
                "comment",
                "text",
                "x509-fingerprint-sha1",
                "other"
            ],
            "Payload type": [
                "comment",
                "text",
                "other"
            ],
            "Support Tool": [
                "link",
                "text",
                "attachment",
                "comment",
                "text",
                "other"
            ],
            "External analysis": [
                "md5",
                "sha1",
                "sha256",
                "filename",
                "filename|md5",
                "filename|sha1",
                "filename|sha256",
                "ip-src",
                "ip-dst",
                "ip-dst|port",
                "ip-src|port",
                "hostname",
                "domain",
                "domain|ip",
                "url",
                "user-agent",
                "regkey",
                "regkey|value",
                "AS",
                "snort",
                "pattern-in-file",
                "pattern-in-traffic",
                "pattern-in-memory",
                "vulnerability",
                "attachment",
                "malware-sample",
                "link",
                "comment",
                "text",
                "x509-fingerprint-sha1",
                "github-repository",
                "other"
            ],
            "Financial fraud": [
                "btc",
                "iban",
                "bic",
                "bank-account-nr",
                "aba-rtn",
                "bin",
                "cc-number",
                "prtn",
                "comment",
                "text",
                "other"
            ],
            "Person": [
                "first-name",
                "middle-name",
                "last-name",
                "date-of-birth",
                "place-of-birth",
                "gender",
                "passport-number",
                "passport-country",
                "passport-expiration",
                "redress-number",
                "nationality",
                "visa-number",
                "issue-date-of-the-visa",
                "primary-residence",
                "country-of-residence",
                "special-service-request",
                "frequent-flyer-number",
                "travel-details",
                "payment-details",
                "place-port-of-original-embarkation",
                "place-port-of-clearance",
                "place-port-of-onward-foreign-destination",
                "passenger-name-record-locator-number",
                "comment",
                "text",
                "other"
            ],
            "Social network": [
                "github-username",
                "github-repository",
                "github-organisation",
                "jabber-id",
                "twitter-id",
                "email-src",
                "email-dst",
                "comment",
                "text",
                "other"
            ],
            "Internal reference": [
                "text",
                "link",
                "comment",
                "other"
            ],
            "Attribution": [
                "threat-actor",
                "campaign-name",
                "campaign-id",
                "whois-registrant-phone",
                "whois-registrant-email",
                "whois-registrant-name",
                "whois-registrar",
                "whois-creation-date",
                "comment",
                "text",
                "x509-fingerprint-sha1",
                "other"
            ],
            "Targeting data": [
                "target-user",
                "target-email",
                "target-machine",
                "target-org",
                "target-location",
                "target-external",
                "comment"
            ],
            "Other": [
                "comment",
                "text",
                "other",
                "size-in-bytes",
                "counter",
                "datetime",
                "cpe",
                "port",
                "float"
            ],
            "Payload delivery": [
                "md5",
                "sha1",
                "sha224",
                "sha256",
                "sha384",
                "sha512",
                "sha512/224",
                "sha512/256",
                "ssdeep",
                "imphash",
                "impfuzzy",
                "authentihash",
                "pehash",
                "tlsh",
                "filename",
                "filename|md5",
                "filename|sha1",
                "filename|sha224",
                "filename|sha256",
                "filename|sha384",
                "filename|sha512",
                "filename|sha512/224",
                "filename|sha512/256",
                "filename|authentihash",
                "filename|ssdeep",
                "filename|tlsh",
                "filename|imphash",
                "filename|impfuzzy",
                "filename|pehash",
                "ip-src",
                "ip-dst",
                "ip-dst|port",
                "ip-src|port",
                "hostname",
                "domain",
                "email-src",
                "email-dst",
                "email-subject",
                "email-attachment",
                "url",
                "user-agent",
                "AS",
                "pattern-in-file",
                "pattern-in-traffic",
                "yara",
                "attachment",
                "malware-sample",
                "link",
                "malware-type",
                "comment",
                "text",
                "vulnerability",
                "x509-fingerprint-sha1",
                "other",
                "ip-dst|port",
                "ip-src|port",
                "hostname|port",
                "email-dst-display-name",
                "email-src-display-name",
                "email-header",
                "email-reply-to",
                "email-x-mailer",
                "email-mime-boundary",
                "email-thread-index",
                "email-message-id",
                "mobile-application-id"
            ]
        },
        "sane_defaults": {
            "gender": {
                "default_category": "",
                "to_ids": 0
            },
            "target-location": {
                "default_category": "Targeting data",
                "to_ids": 0
            },
            "redress-number": {
                "default_category": "Person",
                "to_ids": 0
            },
            "filename|sha224": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "domain|ip": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "filename|sha512/224": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "text": {
                "default_category": "Other",
                "to_ids": 0
            },
            "email-subject": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "email-attachment": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "twitter-id": {
                "default_category": "Social network",
                "to_ids": 0
            },
            "first-name": {
                "default_category": "Person",
                "to_ids": 0
            },
            "pattern-in-traffic": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "filename|imphash": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "whois-registrant-name": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "bic": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "AS": {
                "default_category": "Network activity",
                "to_ids": 0
            },
            "sha512": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "http-method": {
                "default_category": "Network activity",
                "to_ids": 0
            },
            "other": {
                "default_category": "Other",
                "to_ids": 0
            },
            "filename|sha1": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "md5": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "hostname|port": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "whois-registrar": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "bin": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "whois-creation-date": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "filename|impfuzzy": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "travel-details": {
                "default_category": "Person",
                "to_ids": 0
            },
            "email-message-id": {
                "default_category": "",
                "to_ids": 0
            },
            "filename|authentihash": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "email-x-mailer": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "iban": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "prtn": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "sha256": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "hostname": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "imphash": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "country-of-residence": {
                "default_category": "Person",
                "to_ids": 0
            },
            "float": {
                "default_category": "Other",
                "to_ids": 0
            },
            "email-header": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "campaign-id": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "sha512/224": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "cc-number": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "issue-date-of-the-visa": {
                "default_category": "Person",
                "to_ids": 0
            },
            "impfuzzy": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "windows-scheduled-task": {
                "default_category": "Artifacts dropped",
                "to_ids": 0
            },
            "frequent-flyer-number": {
                "default_category": "Person",
                "to_ids": 0
            },
            "target-user": {
                "default_category": "Targeting data",
                "to_ids": 0
            },
            "email-src": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "filename|md5": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "passenger-name-record-locator-number": {
                "default_category": "Person",
                "to_ids": 0
            },
            "whois-registrant-phone": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "dns-soa-email": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "sha224": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "email-dst-display-name": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "aba-rtn": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "filename|sha256": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "special-service-request": {
                "default_category": "Person",
                "to_ids": 0
            },
            "nationality": {
                "default_category": "Person",
                "to_ids": 0
            },
            "mobile-application-id": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "place-port-of-onward-foreign-destination": {
                "default_category": "Person",
                "to_ids": 0
            },
            "github-repository": {
                "default_category": "Social network",
                "to_ids": 0
            },
            "regkey": {
                "default_category": "Persistence mechanism",
                "to_ids": 1
            },
            "passport-number": {
                "default_category": "Person",
                "to_ids": 0
            },
            "jabber-id": {
                "default_category": "Social network",
                "to_ids": 0
            },
            "target-machine": {
                "default_category": "Targeting data",
                "to_ids": 0
            },
            "filename|sha512/256": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "mutex": {
                "default_category": "Artifacts dropped",
                "to_ids": 1
            },
            "place-port-of-original-embarkation": {
                "default_category": "Person",
                "to_ids": 0
            },
            "pehash": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "btc": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "target-org": {
                "default_category": "Targeting data",
                "to_ids": 0
            },
            "date-of-birth": {
                "default_category": "Person",
                "to_ids": 0
            },
            "ip-dst|port": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "place-of-birth": {
                "default_category": "Person",
                "to_ids": 0
            },
            "yara": {
                "default_category": "Payload installation",
                "to_ids": 1
            },
            "pattern-in-file": {
                "default_category": "Payload installation",
                "to_ids": 1
            },
            "user-agent": {
                "default_category": "Network activity",
                "to_ids": 0
            },
            "bank-account-nr": {
                "default_category": "Financial fraud",
                "to_ids": 1
            },
            "passport-expiration": {
                "default_category": "Person",
                "to_ids": 0
            },
            "tlsh": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "ip-dst": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "visa-number": {
                "default_category": "Person",
                "to_ids": 0
            },
            "payment-details": {
                "default_category": "Person",
                "to_ids": 0
            },
            "ip-src": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "port": {
                "default_category": "Network activity",
                "to_ids": 0
            },
            "email-thread-index": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "link": {
                "default_category": "External analysis",
                "to_ids": 0
            },
            "filename|pehash": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "email-reply-to": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "domain": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "threat-actor": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "passport-country": {
                "default_category": "Person",
                "to_ids": 0
            },
            "size-in-bytes": {
                "default_category": "Other",
                "to_ids": 0
            },
            "counter": {
                "default_category": "Other",
                "to_ids": 0
            },
            "comment": {
                "default_category": "Other",
                "to_ids": 0
            },
            "github-organisation": {
                "default_category": "Social network",
                "to_ids": 0
            },
            "target-external": {
                "default_category": "Targeting data",
                "to_ids": 0
            },
            "windows-service-displayname": {
                "default_category": "Artifacts dropped",
                "to_ids": 0
            },
            "snort": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "sha1": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "middle-name": {
                "default_category": "Person",
                "to_ids": 0
            },
            "email-src-display-name": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "sha512/256": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "vulnerability": {
                "default_category": "External analysis",
                "to_ids": 0
            },
            "datetime": {
                "default_category": "Other",
                "to_ids": 0
            },
            "authentihash": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "filename|tlsh": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "place-port-of-clearance": {
                "default_category": "Person",
                "to_ids": 0
            },
            "cpe": {
                "default_category": "Other",
                "to_ids": 0
            },
            "filename|sha512": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "last-name": {
                "default_category": "Person",
                "to_ids": 0
            },
            "pattern-in-memory": {
                "default_category": "Payload installation",
                "to_ids": 1
            },
            "email-dst": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "target-email": {
                "default_category": "Targeting data",
                "to_ids": 0
            },
            "filename|sha384": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "x509-fingerprint-sha1": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "windows-service-name": {
                "default_category": "Artifacts dropped",
                "to_ids": 0
            },
            "sha384": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "filename|ssdeep": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "ip-src|port": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "campaign-name": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "filename": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "regkey|value": {
                "default_category": "Persistence mechanism",
                "to_ids": 1
            },
            "malware-type": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "uri": {
                "default_category": "Network activity",
                "to_ids": 1
            },
            "github-username": {
                "default_category": "Social network",
                "to_ids": 0
            },
            "named pipe": {
                "default_category": "Artifacts dropped",
                "to_ids": 0
            },
            "pdb": {
                "default_category": "Artifacts dropped",
                "to_ids": 0
            },
            "attachment": {
                "default_category": "External analysis",
                "to_ids": 0
            },
            "whois-registrant-email": {
                "default_category": "Attribution",
                "to_ids": 0
            },
            "primary-residence": {
                "default_category": "Person",
                "to_ids": 0
            },
            "url": {
                "default_category": "External analysis",
                "to_ids": 1
            },
            "ssdeep": {
                "default_category": "Payload delivery",
                "to_ids": 1
            },
            "email-mime-boundary": {
                "default_category": "Payload delivery",
                "to_ids": 0
            },
            "malware-sample": {
                "default_category": "Payload delivery",
                "to_ids": 1
            }
        },
        "types": [
            "md5",
            "sha1",
            "sha256",
            "filename",
            "pdb",
            "filename|md5",
            "filename|sha1",
            "filename|sha256",
            "ip-src",
            "ip-dst",
            "hostname",
            "domain",
            "domain|ip",
            "email-src",
            "email-dst",
            "email-subject",
            "email-attachment",
            "float",
            "url",
            "http-method",
            "user-agent",
            "regkey",
            "regkey|value",
            "AS",
            "snort",
            "pattern-in-file",
            "pattern-in-traffic",
            "pattern-in-memory",
            "yara",
            "vulnerability",
            "attachment",
            "malware-sample",
            "link",
            "comment",
            "text",
            "other",
            "named pipe",
            "mutex",
            "target-user",
            "target-email",
            "target-machine",
            "target-org",
            "target-location",
            "target-external",
            "btc",
            "iban",
            "bic",
            "bank-account-nr",
            "aba-rtn",
            "bin",
            "cc-number",
            "prtn",
            "threat-actor",
            "campaign-name",
            "campaign-id",
            "malware-type",
            "uri",
            "authentihash",
            "ssdeep",
            "imphash",
            "pehash",
            "impfuzzy",
            "sha224",
            "sha384",
            "sha512",
            "sha512/224",
            "sha512/256",
            "tlsh",
            "filename|authentihash",
            "filename|ssdeep",
            "filename|imphash",
            "filename|impfuzzy",
            "filename|pehash",
            "filename|sha224",
            "filename|sha384",
            "filename|sha512",
            "filename|sha512/224",
            "filename|sha512/256",
            "filename|tlsh",
            "windows-scheduled-task",
            "windows-service-name",
            "windows-service-displayname",
            "whois-registrant-email",
            "whois-registrant-phone",
            "whois-registrant-name",
            "whois-registrar",
            "whois-creation-date",
            "x509-fingerprint-sha1",
            "dns-soa-email",
            "size-in-bytes",
            "counter",
            "datetime",
            "cpe",
            "port",
            "ip-dst|port",
            "ip-src|port",
            "hostname|port",
            "email-dst-display-name",
            "email-src-display-name",
            "email-header",
            "email-reply-to",
            "email-x-mailer",
            "email-mime-boundary",
            "email-thread-index",
            "email-message-id",
            "github-username",
            "github-repository",
            "github-organisation",
            "jabber-id",
            "twitter-id",
            "first-name",
            "middle-name",
            "last-name",
            "date-of-birth",
            "place-of-birth",
            "gender",
            "passport-number",
            "passport-country",
            "passport-expiration",
            "redress-number",
            "nationality",
            "visa-number",
            "issue-date-of-the-visa",
            "primary-residence",
            "country-of-residence",
            "special-service-request",
            "frequent-flyer-number",
            "travel-details",
            "payment-details",
            "place-port-of-original-embarkation",
            "place-port-of-clearance",
            "place-port-of-onward-foreign-destination",
            "passenger-name-record-locator-number",
            "mobile-application-id"
        ]
    }
}
{
    "Event": {
        "RelatedEvent": [],
        "published": false,
        "org_id": "1",
        "disable_correlation": false,
        "sharing_group_id": "0",
        "proposal_email_lock": false,
        "locked": false,
        "id": "1942",
        "Attribute": [],
        "uuid": "5a57f5c8-2a6c-4408-b91f-1f05ac120003",
        "analysis": "0",
        "orgc_id": "1",
        "ShadowAttribute": [],
        "date": "2018-01-12",
        "distribution": "0",
        "publish_timestamp": "0",
        "Orgc": {
            "uuid": "xxxxxxxx",
            "name": "ORG NAME",
            "id": "1"
        },
        "timestamp": "1515713992",
        "info": "test_1",
        "Org": {
            "uuid": "xxxxxxxx",
            "name": "ORG NAME",
            "id": "1"
        },
        "attribute_count": "0",
        "Galaxy": [],
        "threat_level_id": "1",
        "event_creator_email": "admin@admin.test"
    }
}
{
    "Event": {
        "RelatedEvent": [],
        "published": false,
        "org_id": "1",
        "disable_correlation": false,
        "sharing_group_id": "0",
        "proposal_email_lock": false,
        "locked": false,
        "id": "1942",
        "Attribute": [],
        "uuid": "5a57f5c8-2a6c-4408-b91f-1f05ac120003",
        "analysis": "0",
        "orgc_id": "1",
        "ShadowAttribute": [],
        "date": "2018-01-12",
        "distribution": "0",
        "publish_timestamp": "0",
        "Orgc": {
            "uuid": "xxxxxxxx",
            "name": "ORG NAME",
            "id": "1"
        },
        "timestamp": "1515713992",
        "info": "test_1",
        "Org": {
            "uuid": "xxxxxxxx",
            "name": "ORG NAME",
            "id": "1"
        },
        "attribute_count": "0",
        "Galaxy": [],
        "threat_level_id": "1",
        "event_creator_email": "admin@admin.test"
    }
}
{'Event': {'RelatedEvent': [], 'published': False, 'org_id': '1', 'disable_correlation': False, 'sharing_group_id': '0', 'proposal_email_lock': False, 'locked': False, 'id': '1942', 'Attribute': [], 'uuid': '5a57f5c8-2a6c-4408-b91f-1f05ac120003', 'analysis': '0', 'orgc_id': '1', 'ShadowAttribute': [], 'date': '2018-01-12', 'distribution': '0', 'publish_timestamp': '0', 'Orgc': {'uuid': 'xxxxxxxx', 'name': 'ORG NAME', 'id': '1'}, 'timestamp': '1515713992', 'info': 'test_1', 'Org': {'uuid': 'xxxxxxxx', 'name': 'ORG NAME', 'id': '1'}, 'attribute_count': '0', 'Galaxy': [], 'threat_level_id': '1', 'event_creator_email': 'admin@admin.test'}}
Rafiot commented 6 years ago

Woah, you have a super old MISP version: 2.4.68. Can you update it?

kdeltared commented 6 years ago

Im trying to install the docker version but having issues, will let you know when I have it.

Rafiot commented 6 years ago

Ok, closing this issue then, please re-open if needed.