type=int, help='Analysis level (0: Initial, 1: Ongoing, 2: Completed)') argParser.add_argument( '-T', metavar="integer", type=int, help='Threat level (4: Undefined, 3: Low, 2: Medium, 1: High)') args = argParser.parse_args() if not (args.t or args.e or args.d): sys.exit("Please choose an option") MispEx = MispExtractor(key=args.k, url=args.u) data = MispEx.getMISPData(args.s) if args.t: print(json.dumps(MispEx.getTypes(data), indent=2, sort_keys=True)) elif args.e: MispEx.getExample(data) elif args.d: search = args.d.lower() if search not in MispEx.searches.keys(): sys.exit("Please use a valid search term") matches = MispEx.extractData(data, search, threat_level=args.T, analysis_level=args.A) output = TK.generateCSV(matches) _output(output)