MISP

MISP

Verified 5714 Stars Trending New

MISP (core software) - Open Source Threat Intelligence and Sharing Platform

MISP
May 26, 2025
5714 stars
Category
None
GitHub Stars
5714
Project Added On
May 26, 2025
Contributors
0

MISP - Threat Intelligence Sharing Platform


MISP logo

MISP is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis. MISP is designed by and for incident analysts, security and ICT professionals or malware reversers to support their day-to-day operations to share structured information efficiently.

The objective of MISP is to foster the sharing of structured information within the security community and abroad. MISP provides functionalities to support the exchange of information but also the consumption of said information by Network Intrusion Detection Systems (NIDS), LIDS but also log analysis tools, SIEMs.

  ●  Core functions

  ●  Website / Support

  ●  Installation

  ●  Documentation

  ●  Contributing

  ●  License

Latest Release GitHub version
CI
Gitter
Mastodon
Twitter
Localization
Contributors
License

CLA FREE initiative

Core functions


  • A complete and robust threat intelligence sharing platform that can be deployed on-premise, in the cloud, or as a SaaS solution, suitable for organizations of all sizes.

  • Threat intelligence, ranging from indicators, through techniques to tactics, can be easily described in MISP, from machine-readable actionable data to detailed reports in Markdown format.

  • A flexible reporting system is integrated into MISP, enabling the description of threat intelligence with cross-references to the machine-readable components, including objects and attributes.

  • A fast and efficient database for atomic data points, indicators to complex objects and selectors, enabling the storage of both technical and non-technical information related to cybersecurity intelligence as well as broader intelligence contexts.

  • Automatic correlation engine, revealing relationships between attributes and indicators of malware, attack campaigns, analyses or other described threats. The correlation engine handles the interlinking of matching attributes as well as more advanced correlation patterns such as fuzzy hashing overlaps (e.g. ssdeep) and CIDR block matching. Correlations can also be enabled or event disabled at different levels of granularity.

  • A flexible data model, where complex objects can be expressed and linked together to express threat intelligence, incidents or connected elements.

  • Built-in sharing functionality to ease information exchange, using different, customisable, models of distribution. MISP can automatically synchronize events and attributes as well as higher level threat intelligence among different MISP instances. Advanced filtering functionalities can be used to meet each organization’s sharing policy including a flexible sharing group capability and granularity up to the atomic attribute level.

  • An intuitive user-interface for end-users to create, update and collaborate on events and attributes/indicators, in addition to a graphical interface to navigate seamlessly between events and their correlations as well as an event graph functionality to create and view relationships between objects and attributes. Advanced filtering functionalities and warning lists to help the analysts to contribute events and attributes and limit the risk of false-positives.

  • A comprehensive workflow system to facilitate automatic, customisable data pipelines in MISP, including data qualification, automated analysis, modification, and publication control.

  • Storing data in a structured format, enabling automated use of the database for various purposes, with extensive support for cybersecurity indicators, fraud indicators (e.g., in the financial sector), and broader intelligence contexts.

  • All intelligence and information stored in MISP is accessible via the UI but also an extensive ReST API described as OpenAPI.

  • Export: Generate outputs in various formats, including various native IDS formats, OpenIOC, plain text, CSV, MISP JSON, STIX (XML and JSON) versions 1 and 2, NIDS exports (Suricata, Snort, and Bro/Zeek), RPZ zones, and cache formats for forensic tools. Additional formats, such as PDF, can be easily added and are available via the misp-modules or customised as built in export modules.

  • Import: Support for free-text import, URL import, bulk import, batch import, and importing from formats a long list of formats, including MISP’s own standard format, STIX 1.x/2.0, CSV, or various proprietary formats. Additional formats can be easily added via the misp-modules system.

  • Flexible free-text import tool to simplify the integration of unstructured reports into MISP, with automatic detection and conversion of external reports via provided URLs and text reports with an automatic conversion into MISP reports, objects, and attributes.

  • A user-friendly system to collaborate on events and attributes allowing MISP users to propose changes or updates to attributes/indicators or provide own perspectives or counter-analyses to shared information.

  • An extensive data analyst feature allowing analysts to add opinions, relationships, or comments to any intelligence in MISP, which can be shared using MISP’s sharing mechanisms.

  • Data sharing: Automatically exchange and synchronize information in real-time with other parties and trust groups using MISP, with support for granular sharing levels and custom sharing groups.

  • delegating of sharing: allows for a simple, pseudo-anonymous mechanism to delegate the publication of MISP data to communities.

  • Flexible API to integrate MISP with your own solutions. MISP is bundled with PyMISP which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes. An exhaustive restSearch API to easily search for indicators in MISP and exports those in all the format supported by MISP.

  • Built in tooling to build, test and analyse complex queries directly in the MISP GUI using a highly context aware, templated API client.

  • Adjustable taxonomy to classify and tag events following your own classification schemes or existing classification. The taxonomy can be local to your MISP but also shareable among MISP instances.

  • Intelligence vocabularies called MISP galaxy and bundled with existing threat actors, malware, RAT, ransomware or MITRE ATT&CK which can be easily linked with events, reports and attributes in MISP.

  • Expansion modules in Python to expand MISP with your own services or activate already available misp-modules.

  • Sighting support to get observations from organizations concerning shared indicators and attributes. Sighting can be contributed via the MISP user-interface and the API as MISP data or STIX sighting documents.

  • MISP Standard Format support is integrated into MISP and used by a long list of tools and organisations worldwide. The MISP standard format is stable and backward compatible with older datasets.

  • STIX support: Import and export data in STIX versions 1 and 2 formats, leveraging the powerful misp-stix library.

  • Integrated encryption and signing of the notifications via GnuPG and/or S/MIME depending on the user’s preferences.

  • Dashboard feature: Integrated into MISP, allowing users and organizations to create and share custom composited dashboard configurations as well as build bespoke monitoring solutions directly in a drag and drop interface.

  • Real-time publish-subscribe ch

... Content truncated. Click "See More" to view the full README.

Tool Information

Author

MISP

Project Added On

May 26, 2025

License

Open Source

Tags

github security defensive php javascript python css shell perl makefile cti cybersecurity fraud-detection fraud-management fraud-prevention information-exchange information-security information-sharing intelligence malware-analysis misp stix threat-analysis threat-hunting threat-intel threat-intelligence threat-intelligence-platform threat-sharing threatintel