Every record in Kaspersky Threat Data Feeds contains the following information:
Indicators to match against your events and logs.
Actionable context to provide actionable intelligence for indicators.
Indicators and context fields from feeds are described in the Supported feeds section.
Kaspersky Threat Feed App for MISP does the following:
Downloads the latest version of selected Kaspersky Threat Data Feeds.
Converts new records from these feeds to MISP format.
Removes obsolete records from the MISP instance by using the MISP API.
To add converted feeds to MISP, you must add them as custom feeds from the MISP web interface. Every record from Kaspersky Threat Data Feeds is imported as a MISP event.