tessl install tessl/pypi-pymisp@2.5.0Python API for MISP threat intelligence platform enabling programmatic access to MISP instances.
Agent Success
Agent success rate when using this tile
96%
Improvement
Agent success rate improvement when using this tile compared to baseline
1.25x
Baseline
Agent success rate without this tile
77%
A command-line tool for querying and exporting threat intelligence data from a MISP instance with advanced filtering and multi-format export capabilities.
@generates
import os
from typing import List, Dict, Optional, Any
def connect_to_misp() -> Any:
"""
Establishes connection to MISP instance using environment variables.
Returns:
A PyMISP connection object.
Raises:
ValueError: If MISP_URL or MISP_API_KEY environment variables are not set.
"""
pass
def search_events_by_tags(
misp_connection: Any,
tags: List[str],
tag_logic: str = "AND",
exclude_tags: Optional[List[str]] = None
) -> List[Dict]:
"""
Searches for events matching tag criteria.
Args:
misp_connection: Active MISP connection object.
tags: List of tags to search for.
tag_logic: Logic to apply ("AND" or "OR"). Default is "AND".
exclude_tags: Optional list of tags to exclude (NOT logic).
Returns:
List of matching events as dictionaries.
"""
pass
def search_events_by_time(
misp_connection: Any,
time_range: str,
tags: Optional[List[str]] = None
) -> List[Dict]:
"""
Searches for events within a time range.
Args:
misp_connection: Active MISP connection object.
time_range: Time range in shorthand notation (e.g., "7d", "24h") or date range.
tags: Optional list of tags to filter by.
Returns:
List of matching events as dictionaries.
"""
pass
def export_to_format(
misp_connection: Any,
search_results: List[Dict],
format_type: str,
output_path: str
) -> None:
"""
Exports search results to specified format.
Args:
misp_connection: Active MISP connection object.
search_results: List of events/attributes to export.
format_type: Export format ("json", "csv", "stix2").
output_path: File path where export should be saved.
"""
pass
def search_attributes_by_type(
misp_connection: Any,
attribute_types: List[str],
time_range: Optional[str] = None
) -> List[Dict]:
"""
Searches for attributes of specific types.
Args:
misp_connection: Active MISP connection object.
attribute_types: List of attribute types to search for (e.g., ["ip-src", "domain"]).
time_range: Optional time range filter.
Returns:
List of matching attributes as dictionaries.
"""
pass
def extract_ioc_values(attributes: List[Dict]) -> List[str]:
"""
Extracts IOC values from attribute search results.
Args:
attributes: List of attribute dictionaries.
Returns:
List of attribute values suitable for threat hunting.
"""
passProvides Python API for MISP threat intelligence platform.