Cannot index event publisher.Event

Hi there, I got this setup using misp integration with elastic-agent and looks fine apart from there´s no data on the dashboard page. I can see on the data stream that indeed data is coming but no parsed? Maybe?:

And then on the misp dashboard, there´s nothing showing up:

Did a search on discover page and I found out this:

    "message": "Cannot index event publisher.Event{Content:beat.Event{Timestamp:time.Date(2022, time.June, 6, 4, 34, 19, 939161152, time.Local), Meta:{\"raw_index\":\"logs-ti_misp.threat-default\"}, Fields:{\"agent\":{\"ephemeral_id\":\"c2b0d6a9-2d6b-42a1-a62a-35c0a25e19cf\",\"id\":\"7eb398b7-7081-4334-a7be-d334daeb7589\",\"name\":\"misp\",\"type\":\"filebeat\",\"version\":\"8.2.1\"},\"data_stream\":{\"dataset\":\"ti_misp.threat\",\"namespace\":\"default\",\"type\":\"logs\"},\"ecs\":{\"version\":\"8.0.0\"},\"elastic_agent\":{\"id\":\"7eb398b7-7081-4334-a7be-d334daeb7589\",\"snapshot\":false,\"version\":\"8.2.1\"},\"event\":{\"created\":\"2022-06-06T04:34:19.939Z\",\"dataset\":\"ti_misp.threat\"},\"input\":{\"type\":\"httpjson\"},\"message\":\"{\\\"Event\\\":{\\\"Attribute\\\":{\\\"Galaxy\\\":[],\\\"ShadowAttribute\\\":[],\\\"category\\\":\\\"Network activity\\\",\\\"comment\\\":\\\"\\\",\\\"deleted\\\":false,\\\"disable_correlation\\\":false,\\\"distribution\\\":\\\"5\\\",\\\"event_id\\\":\\\"2086\\\",\\\"first_seen\\\":null,\\\"id\\\":\\\"1335842\\\",\\\"last_seen\\\":null,\\\"object_id\\\":\\\"0\\\",\\\"object_relation\\\":null,\\\"sharing_group_id\\\":\\\"0\\\",\\\"timestamp\\\":\\\"1654365020\\\",\\\"to_ids\\\":true,\\\"type\\\":\\\"ip-dst\\\",\\\"uuid\\\":\\\"bdd20801-c5e7-4c44-8fb9-e7b9daea9a2a\\\",\\\"value\\\":\\\"78.26.128.0/19\\\"},\\\"CryptographicKey\\\":[],\\\"EventReport\\\":[],\\\"Galaxy\\\":[],\\\"Object\\\":[],\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"local\\\":true,\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"local\\\":true,\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"RelatedEvent\\\":[{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-04\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"2286\\\",\\\"info\\\":\\\"alienvault reputation generic feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363478\\\",\\\"uuid\\\":\\\"91c3c5fd-5ef6-4560-bf55-092bae725d13\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"2085\\\",\\\"info\\\":\\\"SSH Bruteforce IPs feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654365017\\\",\\\"uuid\\\":\\\"52220e19-0949-42ce-affc-0c5314f0f875\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1339\\\",\\\"info\\\":\\\"mirai.security.gives feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363916\\\",\\\"uuid\\\":\\\"3f8465b1-c6b2-4918-83fe-f204d1e80786\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1345\\\",\\\"info\\\":\\\"IPsum (aggregation of all feeds) - level 1 - lot of false positives feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654364075\\\",\\\"uuid\\\":\\\"da759957-cd11-4f65-9f65-10528332f955\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1346\\\",\\\"info\\\":\\\"IPsum (aggregation of all feeds) - level 2 - medium false positives feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654364092\\\",\\\"uuid\\\":\\\"f64ee41f-2a4f-40e8-879a-d6092a423fb9\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1347\\\",\\\"info\\\":\\\"IPsum (aggregation of all feeds) - level 3 - low false positives feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654364099\\\",\\\"uuid\\\":\\\"41cc759e-e70c-451b-aaaf-9f52accea779\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1348\\\",\\\"info\\\":\\\"IPsum (aggregation of all feeds) - level 4 - very low false positives feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654364101\\\",\\\"uuid\\\":\\\"ba4c0810-79c9-4949-8834-19c01912ddf0\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1349\\\",\\\"info\\\":\\\"IPsum (aggregation of all feeds) - level 5 - ultra false positives feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654364102\\\",\\\"uuid\\\":\\\"770ec877-fca2-451a-9277-d468d35b5a41\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1350\\\",\\\"info\\\":\\\"IPsum (aggregation of all feeds) - level 6 - no false positives feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654364103\\\",\\\"uuid\\\":\\\"f5826230-9e35-44c9-a0a1-a9d169947b9e\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1308\\\",\\\"info\\\":\\\"blockrules of rules.emergingthreats.net feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363305\\\",\\\"uuid\\\":\\\"52f70db0-5332-496a-a503-bd0571cc902c\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1309\\\",\\\"info\\\":\\\"Tor exit nodes feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363322\\\",\\\"uuid\\\":\\\"b7a1227b-271c-4c65-9847-89763037c1f7\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1310\\\",\\\"info\\\":\\\"Tor ALL nodes feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363336\\\",\\\"uuid\\\":\\\"f3fab519-38d4-40a9-9978-ae7c977076ab\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1312\\\",\\\"info\\\":\\\"pop3gropers feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363409\\\",\\\"uuid\\\":\\\"f4368bc2-18eb-41dc-9367-b5867eced998\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1315\\\",\\\"info\\\":\\\"blocklist.de/lists/all.txt feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363492\\\",\\\"uuid\\\":\\\"4c0d6663-cc72-44e0-aa0e-ac3bd4ce80e5\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1316\\\",\\\"info\\\":\\\"VNC RFB feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363494\\\",\\\"uuid\\\":\\\"3a459b53-a1ad-45c4-83e3-4ac740e2053c\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1317\\\",\\\"info\\\":\\\"sshpwauth.txt feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363506\\\",\\\"uuid\\\":\\\"e896aca2-5e97-4c83-b954-557cbb69880a\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1318\\\",\\\"info\\\":\\\"sipregistration feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363508\\\",\\\"uuid\\\":\\\"5f142140-6e47-4f12-a322-53f38a42f198\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1319\\\",\\\"info\\\":\\\"sipquery feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363510\\\",\\\"uuid\\\":\\\"c679507f-5b95-4212-86c4-e396eeec3e06\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1321\\\",\\\"info\\\":\\\"DNS recursion desired feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363514\\\",\\\"uuid\\\":\\\"d621791f-889a-4926-b084-40e3f253d0e3\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1323\\\",\\\"info\\\":\\\"DNS CH TXT version.bind feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363517\\\",\\\"uuid\\\":\\\"1f6258de-1484-410a-8d37-7c848880eb79\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1326\\\",\\\"info\\\":\\\"SMTP greet feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363730\\\",\\\"uuid\\\":\\\"f9ff4a2e-9c01-4829-a294-a3dc1a634556\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1327\\\",\\\"info\\\":\\\"TELNET login feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363796\\\",\\\"uuid\\\":\\\"e326b1d5-dc31-4984-b1a9-a6d68e454684\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2022-05-31\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1331\\\",\\\"info\\\":\\\"blocklist.greensnow.co feed\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"published\\\":false,\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654363869\\\",\\\"uuid\\\":\\\"bfca8ee7-b808-45a5-8c0b-656b0a492f7e\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1814\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: 15ab56b43bcc0408655897e81b28d051\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653714486\\\",\\\"uuid\\\":\\\"ea3663da-091c-4d6e-9fa3-c58995751108\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1815\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: 995afd2ae2ba92a96c220fa2bf0871f1\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653714547\\\",\\\"uuid\\\":\\\"4c0105fd-67e1-483e-8a16-f74757f0746a\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1816\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: ad1bec046f8488d6a5176acbf3c371d3\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653714607\\\",\\\"uuid\\\":\\\"e31d018f-78ea-47f0-97aa-891613542e04\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1817\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: 881d6cd7e906f090eb7af76d89f661d3\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653714666\\\",\\\"uuid\\\":\\\"ad4ff703-dcff-42d6-9633-ef813b97d238\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1818\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: bd2756042cc8ca63edac979099eecdac\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653714726\\\",\\\"uuid\\\":\\\"b04eb00d-e185-42d2-9b37-8c925eec5158\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1819\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: 12a46cc03240ee4fddaba8bb5606e19b\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653714787\\\",\\\"uuid\\\":\\\"cb91dad1-6d91-429a-8885-e3632deab199\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1820\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: 97b4db7487fc399e62a28d80e866c0dd\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653715927\\\",\\\"uuid\\\":\\\"43d7ca8c-58ef-49bd-8314-54b2319f68fb\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1821\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: 5a244b896bb68bdbc685d736194095ab\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653715987\\\",\\\"uuid\\\":\\\"df50b7a1-eccf-4837-8c6e-16038d3fa4bf\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1822\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: a271656a0ceca635caa44688776561e5\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653716046\\\",\\\"uuid\\\":\\\"7bfd48cf-25aa-4da6-b85e-fd82f431fa2c\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"26\\\",\\\"name\\\":\\\"DIGITALSIDE.IT\\\",\\\"uuid\\\":\\\"9fa9e87c-4c07-4376-96b1-7dbe0ba5b8a6\\\"},\\\"analysis\\\":\\\"0\\\",\\\"date\\\":\\\"2022-05-28\\\",\\\"distribution\\\":\\\"0\\\",\\\"id\\\":\\\"1823\\\",\\\"info\\\":\\\"DigitalSide Malware report: MD5: a69c6ce7267c2bde630286bbc47dc5da\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"26\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"2\\\",\\\"timestamp\\\":\\\"1653716107\\\",\\\"uuid\\\":\\\"762e786d-1085-483c-916d-828e00ab27c5\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"14\\\",\\\"name\\\":\\\"MalwareMustDie\\\",\\\"uuid\\\":\\\"569e04b2-efd0-45bd-b83a-4f7b950d210f\\\"},\\\"analysis\\\":\\\"1\\\",\\\"date\\\":\\\"2020-03-09\\\",\\\"distribution\\\":\\\"3\\\",\\\"id\\\":\\\"1161\\\",\\\"info\\\":\\\"Hajime Linux IoT botnet's P2P nodes (activity since Jan 2020)\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"14\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"3\\\",\\\"timestamp\\\":\\\"1587369610\\\",\\\"uuid\\\":\\\"5e66200c-ad74-4768-b331-425a950d210f\\\"}},{\\\"Event\\\":{\\\"Org\\\":{\\\"id\\\":\\\"1\\\",\\\"name\\\":\\\"Private\\\",\\\"uuid\\\":\\\"f5d006e4-0b4d-4fcc-aacf-3b48890492e9\\\"},\\\"Orgc\\\":{\\\"id\\\":\\\"3\\\",\\\"name\\\":\\\"CIRCL\\\",\\\"uuid\\\":\\\"55f6ea5e-2c60-40e5-964f-47a8950d210f\\\"},\\\"analysis\\\":\\\"2\\\",\\\"date\\\":\\\"2019-05-19\\\",\\\"distribution\\\":\\\"3\\\",\\\"id\\\":\\\"1079\\\",\\\"info\\\":\\\"OSINT -  200+ hosts attempting Linksys RCE exploits\\\",\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"3\\\",\\\"published\\\":true,\\\"threat_level_id\\\":\\\"3\\\",\\\"timestamp\\\":\\\"1558275208\\\",\\\"uuid\\\":\\\"5ce1619d-beec-42e3-93f5-4742950d210f\\\"}}],\\\"ShadowAttribute\\\":[],\\\"Tag\\\":[{\\\"colour\\\":\\\"#004577\\\",\\\"exportable\\\":true,\\\"hide_tag\\\":false,\\\"id\\\":\\\"5\\\",\\\"is_custom_galaxy\\\":false,\\\"is_galaxy\\\":false,\\\"local\\\":0,\\\"local_only\\\":false,\\\"name\\\":\\\"osint:source-type=\\\\\\\"block-or-filter-list\\\\\\\"\\\",\\\"numerical_value\\\":null,\\\"user_id\\\":\\\"0\\\"}],\\\"analysis\\\":\\\"2\\\",\\\"attribute_count\\\":\\\"1327\\\",\\\"date\\\":\\\"2022-06-01\\\",\\\"disable_correlation\\\":false,\\\"distribution\\\":\\\"0\\\",\\\"event_creator_email\\\":\\\"misp@private.local\\\",\\\"extends_uuid\\\":\\\"\\\",\\\"id\\\":\\\"2086\\\",\\\"info\\\":\\\"Telnet Bruteforce IPs feed\\\",\\\"locked\\\":false,\\\"org_id\\\":\\\"1\\\",\\\"orgc_id\\\":\\\"1\\\",\\\"proposal_email_lock\\\":false,\\\"protected\\\":null,\\\"publish_timestamp\\\":\\\"0\\\",\\\"published\\\":false,\\\"sharing_group_id\\\":\\\"0\\\",\\\"threat_level_id\\\":\\\"4\\\",\\\"timestamp\\\":\\\"1654365022\\\",\\\"uuid\\\":\\\"d806d1f3-e068-4b23-924e-ffd9a949cbbf\\\"}}\",\"tags\":[\"forwarded\",\"misp-threat\"]}, Private:(*cursor.updateOp)(0xc0037e15c0), TimeSeries:false}, Flags:0x1, Cache:publisher.EventCache{m:common.MapStr(nil)}} (status=400): {\"type\":\"mapper_parsing_exception\",\"reason\":\"failed to parse field [threat.indicator.ip] of type [ip] in document with id 'wRM+msSuYGFkvFCIwqmp1md0cOE='. Preview of field's value: '78.26.128.0/19'\",\"caused_by\":{\"type\":\"illegal_argument_exception\",\"reason\":\"'78.26.128.0/19' is not an IP string literal.\"}}, dropping event!"

'78.26.128.0/19' is not an IP string literal?

Hello @francescouk ,

Which Elastic Stack version are you using? Which ti_misp version are you using?

The ip field type supports only a single IP, not an IP range; the ti_misp integration leverages Elastic Common Schema, where threat.indicator.ip is expected to be an ip type field.

This suggests that your incoming data is not conforming to the expectation for some reason (I'm not familiar with MISP so I'm not sure why) thus parsing breaks as you correctly identified.

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.