Kaspersky Threat Feed App for MISP is designed in such a way that the user periodically runs the master script file run.py. However you can run the importing script import_to_misp.py instead. The import_to_misp.py script runs from the command line as follows:
python %utility_dir%/import_to_misp.py --misp_url <MISP_URL> --auth_key <MISP_authorization_key> --proxy <proxy_to_MISP> --feed_file <feed> --deleted_file <file_with_deleted_records> --added_file <file_with_added_records> --work_dir <working_directory> [-nv]
On your computer, the command that runs Python may have a different name (for example, python3
or py
).
The following table contains the description of the command-line parameters.
Parameters of the importing script
Parameter |
Description |
|
URL or IP address at which the MISP instance is available. If your MISP instance uses an SSL certificate to establish secure connections over HTTPS, then the URL must begin with the The |
|
Key for gaining access to the MISP instance. The |
|
Proxy settings in the The |
|
Path to the feed file to be initially imported. It can be an absolute or relative path. A relative path is calculated relative to the import_to_misp.py file. Only local paths are supported; SMB, FTP, or HTTP paths are not supported. The |
|
Path to the diff feed file that contains deleted records. It can be an absolute or relative path. A relative path is calculated relative to the import_to_misp.py file. Only local paths are supported; SMB, FTP, or HTTP paths are not supported. The |
|
Path to the diff file that contains added records. It can be an absolute or relative path. A relative path is calculated relative to the import_to_misp.py file. Only local paths are supported; SMB, FTP, or HTTP paths are not supported. The |
|
Path to the working directory. It can be an absolute or relative path. A relative path is calculated relative to the import_to_misp.py file. Only local paths are supported; SMB, FTP, or HTTP paths are not supported. To prevent the feed file from being overwritten with a temporary file, do not specify the directory containing the feed file (see the description of the The |
|
Maximum number of attributes that a MISP event will contain. It must be a non-negative integer ( The |
|
Disables the SSL certificate verification that is performed when connecting to a MISP instance by HTTPS. Use this parameter if you use a self-signed certificate on your MISP instance. Otherwise, the converter will lack the capability to add, modify, or delete events and attributes in MISP during work with the MISP API. This parameter is intended for evaluation purposes only. Using this parameter in a production environment may create security issues. |