MISP is an open-source threat intelligence platform designed to facilitate the collection, analysis, and sharing of Indicators of Compromise (IOCs) and threat data across trusted communities. Built by and for security analysts, it supports structured collaboration across SOCs, CERTs, and CTI teams.

Primary Use Cases:


Core Capabilities

Function Description
Event Management Analysts can create and manage events tied to incidents or campaigns. Events are containers for attributes and context.
Attribute Handling Stores technical and contextual data: IPs, hashes, domains, YARA rules, malware family tags, etc.
Correlation Engine Detects relationships across attributes and events (e.g., same IP seen across multiple events). Supports fuzzy matching, CIDR range correlation, etc.
Event Graphs Visualizes object and attribute relationships using node-link graphs.
Sharing Controls Flexible distribution levels: private, community, connected networks, or public.
Tagging & Taxonomy Use tags, classifications (e.g., TLP, threat actor, confidence level) to organize and label threat data.
Import & Export Supports STIX (v1/v2), OpenIOC, CSV, JSON, Suricata, Zeek, Snort, and many more.
API Access Enables automation, feed ingestion, and integration with SIEMs, SOARs, and other tooling.

Event Lifecycle in MISP

Step 1: Event Creation


Step 2: Add Attributes