tessl install tessl/pypi-pymisp@2.5.0Python API for MISP threat intelligence platform enabling programmatic access to MISP instances.
Agent Success
Agent success rate when using this tile
96%
Improvement
Agent success rate improvement when using this tile compared to baseline
1.25x
Baseline
Agent success rate without this tile
77%
Build a command-line tool that enriches threat intelligence events with reputation data from external security services.
Security analysts often need to validate and enrich indicators of compromise (IOCs) like file hashes and URLs by checking them against external threat intelligence services. This tool should automate the enrichment process by fetching reputation data and updating the threat intelligence database accordingly.
Your tool should:
Accept input parameters via command-line arguments:
Retrieve the event from the MISP instance and extract all relevant indicators that need enrichment (file hashes and URLs)
Query the external service for each indicator to get reputation scores and detection information
Create enrichment records in the MISP instance that link each indicator to its reputation data, including:
Output a summary showing:
https://misp.local with API key test-api-key-12345Given an event with 3 file hashes, when enriched with VirusTotal data, then all 3 hashes should have associated enrichment records with detection ratios. @test
Given an event with 2 URLs, when enriched with VirusTotal data, then both URLs should have enrichment records containing reputation scores. @test
Given an invalid event ID, when attempting enrichment, then the tool should print an error message and exit with non-zero status. @test
@generates
"""
IOC Enrichment Tool
Command-line interface:
python enrich_iocs.py <event_id> <service_name> <api_key>
Example:
python enrich_iocs.py 123 virustotal YOUR_VT_API_KEY
"""Python library for interacting with MISP threat intelligence platform.