Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 684

MISP

What is MISP?

MISPMISP is an open-source threat intelligence platform for collecting, storing, correlating, and sharing structured indicators and analyst context across trusted communities.


Malware Information Sharing Platform and Threat Sharing (MISP) is a widely deployed open-source TIP, originally developed by CIRCL, that stores intelligence as Events containing Attributes (IoCs), Objects, Galaxies, and Tags. Synchronization between MISP instances enables federated sharing across CERTs, ISACs, and private communities with fine-grained distribution levels and TLP labels. MISP supports STIX 2.1, OpenIOC, and custom feeds, exports IDS-ready signatures (Suricata, Snort, Sigma), and integrates with SIEMs and EDRs via API or ZeroMQ. Analysts use it to correlate sightings across cases, tag campaigns with MITRE ATT&CK, and operationalize indicators with low friction.

Examples

  1. 01

    A national CERT shares ransomware indicators with sector members via federated MISP synchronization.

  2. 02

    Exporting Suricata rules from a MISP event to a perimeter IDS.

Frequently asked questions

What is MISP?

MISP is an open-source threat intelligence platform for collecting, storing, correlating, and sharing structured indicators and analyst context across trusted communities. It belongs to the Defense & Operations category of cybersecurity.

What does MISP mean?

MISP is an open-source threat intelligence platform for collecting, storing, correlating, and sharing structured indicators and analyst context across trusted communities.

How does MISP work?

Malware Information Sharing Platform and Threat Sharing (MISP) is a widely deployed open-source TIP, originally developed by CIRCL, that stores intelligence as Events containing Attributes (IoCs), Objects, Galaxies, and Tags. Synchronization between MISP instances enables federated sharing across CERTs, ISACs, and private communities with fine-grained distribution levels and TLP labels. MISP supports STIX 2.1, OpenIOC, and custom feeds, exports IDS-ready signatures (Suricata, Snort, Sigma), and integrates with SIEMs and EDRs via API or ZeroMQ. Analysts use it to correlate sightings across cases, tag campaigns with MITRE ATT&CK, and operationalize indicators with low friction.

How do you defend against MISP?

Defences for MISP typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for MISP?

Common alternative names include: Malware Information Sharing Platform, MISP Project.

Related terms