MISP is my greatest open-source threat intelligence tool. It is not attractive but it is very powerful in the areas that matter most. MISP enables you to collect, normalize, correlate, and share threat intelligence in a structured manner. It fits perfectly with SOC workflows, incident response, and detection engineering.
What I like the most:
- You have the option to gather IOCs from more than one source and thus avoid messy spreadsheets
- Powerful correlation engine. It really detects connections among the data and not just creates a dump of the data
- Simple integration with SIEM, SOAR, and enrichment pipelines
- Designed for inter-team and inter-organizational collaboration and sharing
Nevertheless, MISP by itself is not sufficient. I usually combine it with:
- OpenCTI for drawing the links between threats, campaigns, and actors
- The Hive for incident response case management
- Virus Total public feeds for fast enrichment
To put it briefly. For a serious, production-ready open-source TI platform, MISP is the best option. If you require visuals and context, OpenCTI is a great addition. What do you think about this personality?