Kaspersky Threat Feed App for MISP works as follows:
main.py) with the parameters specified in the "Command-line parameters" section.main.py) generates a configuration file for Feed Utility based on the template.conf file.Feed Utility is a tool designed to simplify the process of downloading and filtering data feeds. Able to compare feed versions and apply rules from a configuration file, this tool is a core component of integration with the Kaspersky Data Feeds API. For more information, see the Feed Utility guide,
For information about filtering data feeds, see the "Filtering rules" section. The filtering rules can be configured in the FEEDS parameter of the settings.py file.
workdir/%feed_name%" directory inside the converter's parent folder.This is used for records with changed context fields. Depending on the feed type, the update may take a significant amount of time. The converter performs a full diff update only at intervals (in hours) defined by the full_update_interval_h parameter (see the "Command-line parameters" section).
This update only adds records with new indicators of compromise (IOC) and deletes records with obsolete IOCs (the context is not updated). The converter performs this update at intervals defined by the schedule specified for the cron utility.

Kaspersky Threat Feed App for MISP workflow