6,500+
Active MISP community instances globally sharing threat intelligence
STIX 2.1
Adopted as the standard intelligence format by NSA, CISA, and most commercial TIPs
60-70%
Of threat intelligence consumed from commercial feeds per Gartner research
18% CAGR
TIP market growth rate through 2027 per IDC forecast

Threat intelligence platforms occupy a specific and often misunderstood niche in the security stack. They are not SIEM replacements, not vulnerability scanners, and not SOARs. A TIP manages intelligence as a structured knowledge base: threat actor profiles, malware families, attack campaigns, and the indicators associated with each, with metadata about confidence, source, and temporal validity. What makes a TIP valuable is not its ability to store IOCs but its ability to make intelligence operationally useful by automating enrichment, distributing indicators to detection tools, and enabling analysts to answer the question "what do we know about this threat actor?"

The market splits cleanly between open-source platforms (MISP and OpenCTI) that require significant internal engineering investment and commercial platforms (ThreatConnect, Recorded Future, Anomali) that provide managed capabilities at higher cost. This comparison covers both categories honestly.

What a TIP Does vs What a SIEM Does

The most common misconception about TIPs is that they duplicate SIEM functionality. They do not. They address different aspects of the threat intelligence lifecycle.

The SIEM's job is to collect security events from your environment (Windows event logs, firewall logs, authentication logs, network flows, endpoint telemetry), correlate them against detection rules, and surface alerts when anomalous or malicious patterns are detected. A SIEM is retrospective: it tells you what happened in your environment based on the data it has collected. It is excellent at detecting known patterns in log data but requires that intelligence be expressed as detection rules (KQL, SPL, YARA-L) to be actionable.

The TIP's job is to manage threat intelligence as structured knowledge, curate indicator quality, maintain the relationships between threat actors, malware families, campaigns, and techniques, and distribute actionable intelligence to the tools that need it. A TIP is prospective: it tells you what threats exist and what indicators to watch for, so that your detection tools can identify them when they appear.

The relationship between them is directional: the TIP feeds the SIEM with curated IOCs, which the SIEM matches against log data to generate alerts. The SIEM feeds the TIP (or SOAR) with alert context that triggers threat intelligence lookup queries, enriching alerts with attribution and campaign data. Neither can perform the other's function well.

Why you cannot skip the TIP and just import IOC lists into your SIEM:

Raw IOC feeds imported directly into a SIEM without a TIP in between generate significant noise. Most threat intelligence feeds contain aged indicators, known-good infrastructure that appears in attacker reports, and CDN/legitimate service IPs that generate massive false positive volumes when matched against network logs. A TIP provides the curation layer: scoring indicator confidence, applying expiration dates, deduplicating across sources, and filtering out known-benign infrastructure before indicators reach the SIEM. Organizations that skip the TIP and import raw feeds directly into their SIEM often disable the threat intelligence matching function entirely due to noise, which defeats the purpose.

Open Source: MISP in Depth

MISP (Malware Information Sharing Platform) started as a platform for sharing threat intelligence within and between organizations. It is now the most widely deployed open-source TIP globally, with over 6,500 active community instances.

Architecture: MISP is a PHP/Python web application running on Linux (Ubuntu 22.04 and Debian are the supported platforms as of MISP 2.4.x). The backend uses MySQL for structured data and Redis for caching and background job queues. A MISP instance can run on a single server (4+ vCPUs, 16+ GB RAM recommended for production with feeds enabled) or in a distributed configuration with separate database, worker, and web tiers. The REST API is MISP's primary integration interface and supports both the native MISP JSON format and STIX 2.1 export.

Core data model: MISP organizes intelligence around Events (the top-level container), Objects (structured groupings of related attributes, for example a Network Activity object containing an IP, domain, and URL), Attributes (individual data points like IP addresses, domain names, file hashes, email subjects), and Tags (MISP's taxonomy system for classification, including threat actor tags, TLP markings, and MITRE ATT&CK technique tags). The Galaxies feature provides pre-built knowledge bases for threat actors (MITRE ATT&CK groups), malware families (MalPedia), ransomware groups, and more.

Feeds and sharing: MISP supports three feed types: MISP feeds (other MISP instances published as JSON over HTTP), Freetext feeds (line-separated indicator lists), and CSV feeds. The MISP community maintains a curated list of default feeds including abuse.ch feeds, CIRCL OSINT feeds, and several government CERT feeds. MISP's sharing model allows data to be shared selectively: Events can be shared with specific organizations, MISP communities (trust circles), or published publicly. The MISP Project operates several community MISP instances that serve as intelligence sharing hubs for ISACs and national CERTs.

Integration points:

  • SIEM: MISP-to-Splunk via the Splunk MISP Add-on; MISP-to-Sentinel via the Threat Intelligence Platforms connector
  • SOAR: MISP has native integrations with TheHive (open-source SOAR/IR case management), Cortex (analyzer and responder platform), and commercial SoARs via REST API
  • EDR: MISP can export indicator lists in formats compatible with most EDR platforms via the misp-modules export framework
  • Firewall: MISP feeds can be consumed by pfSense, Palo Alto Networks, and Fortinet via TAXII or direct REST API integration

Limitations: MISP's UI is functional but not optimized for analyst workflow. Large event lists with thousands of events require significant database tuning (MySQL query optimization, proper indexing on created_at and distribution fields) to perform acceptably. The platform has no built-in analyst intelligence production workflow (reports, finished intelligence documents) beyond raw event management.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Open Source: OpenCTI in Depth

OpenCTI (Open Cyber Threat Intelligence) is a STIX 2.1-native threat intelligence platform developed by Filigran (formerly the ANSSI/LaBRI project). Unlike MISP, which grew from an IOC sharing tool, OpenCTI was designed from the ground up around STIX 2.1 and the structured knowledge graph model of threat intelligence.

Architecture: OpenCTI uses a modern microservices architecture. The core components are: OpenCTI platform (Node.js/GraphQL API), OpenCTI frontend (React), OpenSearch (Elasticsearch-compatible search and storage backend), MinIO (object storage for documents and attachments), Redis (caching and job queues), and RabbitMQ (message broker for connector workers). The minimum recommended production deployment is Kubernetes (Helm chart provided) with 8+ vCPUs and 32+ GB RAM. A Docker Compose configuration is available for development and evaluation.

STIX 2.1 native model: Every object in OpenCTI is a STIX 2.1 object: Threat Actor, Campaign, Malware, Tool, Attack Pattern, Indicator, Observable, Relationship, Report. The platform enforces STIX semantics: relationships between objects are explicit STIX Relationship objects, not implicit database foreign keys. This makes OpenCTI's data model maximally interoperable with other STIX-compliant systems but requires analysts to think in STIX terminology when creating intelligence.

Connectors: OpenCTI's connector ecosystem is its primary differentiator. Connectors are Python workers that import intelligence from external sources or export to downstream tools. The official connector library (github.com/OpenCTI-Platform/connectors) includes 100+ connectors covering: MITRE ATT&CK (auto-imports the full ATT&CK knowledge base), MISP (bidirectional sync), VirusTotal, Shodan, CIRCL OSINT, AlienVault OTX, abuse.ch feeds, CVE/NVD, and many commercial intelligence providers. Export connectors push to Splunk, Elastic, Microsoft Sentinel (via TAXII), and firewall platforms. This connector architecture means OpenCTI functions as an intelligence orchestration hub, pulling from many sources and distributing to many consumers automatically.

Analyst workflow: OpenCTI provides a knowledge graph visualization interface where analysts can explore the relationships between threat actors, malware families, campaigns, and infrastructure. The Investigation workspace allows analysts to build relationship graphs interactively during analysis and export them as STIX bundles or PDF reports. The native report module supports finished intelligence production with entity linking, making OpenCTI more suitable than MISP for organizations that produce finished intelligence products (threat actor profiles, campaign reports) alongside raw indicator management.

Filigran's commercial offering: Filigran offers OpenCTI Cloud (fully managed SaaS deployment) and OCTI Enterprise Edition with additional features and SLA-backed support. The community edition is fully open source under Apache 2.0.

Commercial Platforms: ThreatConnect, Recorded Future, and Anomali

Commercial TIPs provide managed capabilities, vendor support, and pre-built intelligence content at price points that reflect the operational investment saved versus self-managing open-source platforms.

ThreatConnect: ThreatConnect is a traditional TIP with a strong emphasis on analyst workflow, playbook automation (similar to SOAR), and intelligence lifecycle management. Key capabilities: the ThreatConnect Intelligence platform ingests STIX/TAXII, CSV, JSON, and vendor-specific formats; the ThreatConnect SOAR module (TC Playbooks) automates enrichment, notification, and response workflows; ThreatConnect Risk Quantifier provides an exposure scoring model. ThreatConnect is deployed as SaaS (ThreatConnect Cloud) or on-premises and targets mid-enterprise to large enterprise customers. Pricing is not public; enterprise contracts commonly run $150,000 to $500,000 annually for the platform plus content subscriptions. ThreatConnect's differentiator is its playbook automation capability integrated natively with the TIP, which reduces the need for a separate SOAR platform.

Recorded Future: Recorded Future is better described as an intelligence provider than a platform. The core product is Recorded Future's Intelligence Cloud, which continuously collects and analyzes data from millions of sources including open web, dark web forums, paste sites, code repositories, social media, and technical indicators. Machine learning models produce risk scores (Domain Risk Score, IP Risk Score, Vulnerability Risk Score, Person Risk Score) and curated intelligence packs covering threat actors, vulnerabilities, and compromised credentials. Recorded Future integrates with SIEM, SOAR, and TIP platforms as an enrichment source rather than as a standalone workflow tool. It is the premier intelligence source subscription in the market; it is not a replacement for a TIP that manages your own intelligence and analyst workflow.

Anomali: Anomali's platform (Anomali ThreatStream) is a mature TIP targeting enterprise and government customers with high-volume IOC management requirements. ThreatStream provides: automated feed ingestion from commercial and open-source sources, confidence scoring and deduplication, workflow for analyst investigation and escalation, and output integrations to SIEM, firewalls, and EDR. Anomali LENS is a browser extension and document scanning feature that automatically detects threat intelligence in unstructured documents (PDFs, HTML pages) and links them to ThreatStream records, reducing manual intelligence extraction work. Anomali Match (formerly Staxx) provides automated indicator matching against historical logs stored in cloud storage, enabling retroactive hunting without a running SIEM query.

Intel 471: Deserves mention as a category leader for human intelligence and criminal underground monitoring. Intel 471 is primarily an intelligence source rather than a TIP platform, specializing in actor-centric intelligence from criminal forums, malware-as-a-service ecosystems, and compromised credential markets. It integrates with TIPs as a premium feed source. Organizations building a CTI function with actor attribution capability typically subscribe to Intel 471 as one of several commercial intelligence sources consumed by their TIP.

STIX 2.1 and TAXII 2.1 Integration Patterns

STIX 2.1 and TAXII 2.1 are the infrastructure standards that enable interoperability between TIPs, SIEMs, and intelligence sharing communities. Understanding the mechanics is necessary for planning integrations.

STIX 2.1 object types relevant to TIP integration:

  • indicator: A pattern (expressed in STIX Pattern Language or Sigma) that identifies malicious activity. Contains the actual detection pattern, valid_from/valid_until timestamps, confidence score, and labels.
  • threat-actor: Profiles of adversaries with motivation, sophistication, aliases, and relationships to campaigns and malware.
  • malware: Descriptions of malware families including capabilities, kill chain phase, and relationships to indicators.
  • campaign: Named attack campaigns linking threat actors, malware, indicators, and targeted industries.
  • relationship: First-class STIX objects expressing connections between other objects (e.g., threat-actor uses malware, campaign targets industry).
  • bundle: A container for multiple STIX objects transferred together.

TAXII 2.1 server structure:

A TAXII 2.1 server exposes collections (named groups of STIX objects) via REST endpoints. The key endpoints:

  • GET /taxii2/ returns the API root discovery
  • GET /api/collections/ lists available collections
  • GET /api/collections/{id}/objects/ retrieves STIX objects from a collection, with filter parameters for added_after, object type, and STIX IDs
  • POST /api/collections/{id}/objects/ adds objects to a collection (for sharing)

Microsoft Sentinel's Threat Intelligence data connector polls a configured TAXII 2.1 endpoint every hour and imports indicator objects into the ThreatIntelligenceIndicator table. The connector supports TAXII 2.0 and 2.1 and authenticates via HTTP Basic Auth or API key depending on the server configuration.

Splunk Enterprise Security's Threat Intelligence Framework accepts STIX/TAXII 2.0 input via the Splunk Add-on for Threat Intelligence or via custom scripted inputs using the TAXII REST API.

Filtering stale indicators:

One of the most critical TAXII integration configurations is filtering indicators by valid_until to prevent importing expired IOCs. STIX 2.1 indicators include optional valid_from and valid_until timestamps. Indicators without a valid_until are treated as indefinitely valid by many consuming platforms, which causes accumulation of aged indicators over time. Best practice: configure TAXII consumers to request only indicators added within the past 30 days, and configure the TIP to set valid_until on all indicator objects at creation time based on the indicator type (IP addresses: 30 days; domains: 60 days; file hashes: 180 days; URL patterns: 30 days).

Decision Framework by Organization Size and Maturity

Selecting a TIP requires matching platform capability to organizational maturity, staff capacity, and budget. The following framework covers four organization profiles.

Profile 1: Security team under 10 people, no dedicated CTI analyst

Recommendation: Skip a standalone TIP. Integrate 2-3 high-quality free indicator feeds directly into your SIEM using the platform's native threat intelligence integration (Sentinel's TI data connector, Splunk's Threat Intelligence Framework). Focus on quality over quantity: abuse.ch feeds and CISA KEV integrated into your SIEM provide high-signal, low-noise indicator matching with minimal operational overhead. Add a commercial TIP only when you have a dedicated analyst with time to manage it.

Profile 2: Security team of 10-50 people, part-time CTI function

Recommendation: Deploy OpenCTI with managed hosting (Filigran's OpenCTI Cloud starts at approximately $1,000-2,000/month for small deployments) or self-host MISP on a dedicated VM with 3-5 curated community feeds. Integrate with SIEM via TAXII. The investment is justified if analysts are currently managing IOC spreadsheets manually or wasting time on threat context lookups without enrichment. Do not invest in a commercial TIP until the CTI function is consuming the open-source platform's capabilities fully.

Profile 3: Enterprise security team of 50-500 people, dedicated CTI team

Recommendation: Evaluate ThreatConnect or Anomali ThreatStream as the TIP alongside a Recorded Future subscription as the primary commercial intelligence source. The TIP manages analyst workflow, intelligence production, and distribution; Recorded Future provides the data. Budget $200,000-500,000 annually for the combined platform plus intelligence subscription. Evaluate MISP in parallel as the community sharing hub if the organization participates in ISAC sharing communities.

Profile 4: Large enterprise or government, mature CTI program with multiple analysts

Recommendation: A dual-platform approach is common: MISP as the community sharing and open-source feed aggregation platform, with a commercial TIP (ThreatConnect, Anomali, or a custom OpenCTI deployment) as the analyst-facing production and workflow layer. The two platforms sync via STIX/TAXII. This provides the breadth of the MISP community ecosystem with the analyst workflow quality of a commercial platform. At this scale, Intel 471 and a second commercial intelligence source (Flashpoint, ZeroFox) are standard components of the intelligence collection portfolio.

The bottom line

The right TIP is the one your team will actually use consistently and that integrates reliably with your SIEM and detection tools. For most organizations, the value of a TIP is unlocked not by the platform features but by the discipline of maintaining indicator quality, applying expiration dates, and automating the distribution of curated IOCs to detection tools. Open-source platforms (MISP, OpenCTI) provide enterprise capability at license cost savings that justify the engineering investment for teams with the capacity to manage them. Commercial platforms (ThreatConnect, Recorded Future, Anomali) reduce operational overhead at significant cost, with Recorded Future uniquely positioned as a premium intelligence source rather than a workflow platform.

Frequently asked questions

What is the difference between a TIP and a SIEM?

A TIP manages threat intelligence as structured data: threat actor profiles, malware family relationships, attack campaign timelines, and indicators of compromise with their associated context, confidence levels, and expiration dates. A SIEM collects and correlates security events from your environment's logs and alerts. The TIP answers questions like "Who is this threat actor, what techniques do they use, and what IOCs are associated with them?" The SIEM answers questions like "Did any of those IOCs appear in my environment's logs in the past 24 hours?" The two systems are complementary: the TIP enriches SIEM alerts with threat context and distributes curated IOCs to the SIEM for matching. Running a SIEM without a TIP means threat context enrichment is manual; running a TIP without a SIEM means you have intelligence but no way to detect when that intelligence manifests in your environment.

Is MISP good enough for an enterprise, or do I need a commercial TIP?

MISP is technically capable of handling enterprise-scale threat intelligence operations, and several major government agencies and large enterprises use it as their primary TIP. The honest answer is that MISP's limitation is operational, not technical: it requires significant internal engineering effort to install, maintain, tune, and integrate into your security stack. There is no vendor support contract; troubleshooting relies on community forums and the core team's GitHub responses. For organizations with strong Python/Linux engineering capacity and the staff to maintain it, MISP provides enterprise-grade capabilities at zero license cost. For organizations that need SLA-backed support, managed feeds, and a vendor who will integrate with their stack on request, a commercial TIP is the better operational choice. A hybrid approach is common: use MISP as the community intelligence sharing hub and a commercial platform as the analyst-facing enrichment and workflow layer.

What is STIX/TAXII and why does it matter for threat intelligence sharing?

STIX (Structured Threat Information Expression) is a standardized JSON schema for representing threat intelligence objects: indicators, threat actors, attack patterns, malware, campaigns, courses of action, and the relationships between them. TAXII (Trusted Automated Exchange of Intelligence Information) is the protocol for distributing STIX content between systems, operating as a REST API with collection and channel endpoints. Together, they define how threat intelligence is formatted and how it moves between systems without custom integration work. A STIX 2.1-native platform can receive a threat actor profile from a government CERT, automatically link it to related malware objects, and push the associated indicators to your SIEM without human intervention. Organizations that do not support STIX/TAXII are limited to proprietary feed formats and CSV IOC imports, which require custom parsing work for every new source.

How does Recorded Future differ from a traditional TIP?

Recorded Future is best classified as a Threat Intelligence Provider and analytics platform rather than a traditional TIP. The core product is Recorded Future's intelligence cloud, which continuously ingests data from the open web, dark web, technical sources (paste sites, code repositories, vulnerability databases, and attacker infrastructure), and applies machine learning to produce risk scores, alert profiles, and analyst-ready intelligence packages. A traditional TIP like ThreatConnect or Anomali is a platform you bring intelligence into from multiple sources; Recorded Future is primarily a source of intelligence that also provides a platform for consuming and operationalizing that intelligence. Many organizations use Recorded Future as a premium intelligence feed source integrated into their TIP, SIEM, or SOAR, rather than as a standalone TIP replacement. The distinction matters for procurement: Recorded Future pricing is based on access to the intelligence product, not on platform usage.

What is the minimum viable TIP for a 50-person security team?

For a 50-person security team (which typically implies a SOC of 5-15 analysts), the minimum viable TIP serves three functions: centralizing IOC management so analysts are not maintaining spreadsheets of indicators, integrating with the SIEM to automatically match IOCs against log data, and providing some intelligence enrichment for analyst investigation workflows. MISP with a curated set of free community feeds (abuse.ch URLhaus, MalwareBazaar, CIRCL OSINT feeds) and the MISP-SIEM connector meets these requirements at zero license cost for organizations with the engineering capacity. Commercially, ThreatConnect's TC Open (entry-level tier) or OpenCTI with a managed cloud deployment option (OpenCTI Cloud via Filigran) cover this use case with lower engineering overhead. The critical investment is not the platform license but the analyst time required to tune feeds, manage false positive IOCs, and maintain the integration with the SIEM.

How do I integrate a TIP with my SIEM and EDR?

TIP-to-SIEM integration typically uses one of three patterns: TAXII server integration (the SIEM polls the TIP's TAXII endpoint for new indicators and creates matching rules), syslog/CEF forwarding (the TIP pushes alerts and enriched events to the SIEM in CEF format), or REST API integration (custom scripted synchronization using both platforms' APIs). Microsoft Sentinel supports TAXII 2.0/2.1 natively via the Threat Intelligence data connector, which polls a configured TAXII endpoint hourly. Splunk Enterprise Security integrates with TIPs via the Threat Intelligence Framework, which accepts STIX, CSV, and JSON feeds. For EDR integration, most TIPs support exporting indicator lists (domains, IPs, file hashes) in formats compatible with CrowdStrike Falcon's Custom IOA/IOC management interface, SentinelOne's Blacklist, or Microsoft Defender Indicators. Automated bi-directional integration, where SIEM alerts trigger TIP enrichment queries and TIP updates automatically push to the SIEM, requires a SOAR platform as the orchestration layer.

What threat intelligence feeds should I start with?

Start with free, high-quality, low-noise feeds before adding commercial subscriptions. For malware-related indicators: abuse.ch MalwareBazaar (malware hashes with family tags), URLhaus (malicious URLs and domains delivering malware), and ThreatFox (IOCs from known malware families). For phishing: OpenPhish and PhishTank. For scanning and exploitation activity: GreyNoise Community (IP addresses actively scanning the internet) and Shodan Malicious IPs. For government-grade intelligence: CISA AIS (Automated Indicator Sharing, available to US critical infrastructure operators), the EclecticIQ Community feed, and CIRCL OSINT feeds (available to MISP community members). For commercial feeds, Recorded Future's Community edition and Intel 471's entry-tier TITAN portal provide high-signal intelligence at entry-level price points. Evaluate feed quality by measuring the hit rate against your SIEM logs, the IOC false positive rate, and the IOC shelf life (how quickly indicators go stale).

Sources & references

  1. MISP Project: Official Documentation and Community Feeds
  2. OpenCTI: Documentation and Connector Library
  3. FIRST: STIX 2.1 and TAXII 2.1 Standards
  4. Gartner: Market Guide for Security Threat Intelligence Products and Services 2024
  5. IDC: Worldwide Threat Intelligence Services Forecast 2024-2027

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Related Questions — Answer Hub

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.