Glossary  /  The basics

Glossary

What are STIX and MISP?

STIX is the format. MISP is the platform. The two together are how most CTI teams share intelligence between organisations, vendors, and ISACs.

STIX — the data format

STIX (Structured Threat Information eXpression) is an OASIS standard for describing threats in a machine-readable way. STIX 2.1 is the current version. It models the world as objects and relationships:

A STIX bundle is a JSON object containing those building blocks. Any STIX-capable platform can ingest it. Most CTI platforms produce STIX bundles per cluster, per incident, or per campaign.

TAXII — the way STIX moves

TAXII is the transport layer that ships STIX between systems. If STIX is the email, TAXII is the SMTP. Most teams interact with it as a REST API: a TAXII server exposes collections of STIX objects, and a client polls them.

MISP — the platform

MISP (Malware Information Sharing Platform) is open-source software that lets organisations store, enrich, and share threat intelligence. It pre-dates STIX 2 and uses its own JSON event format, but it speaks STIX too, so the two ecosystems interoperate.

What MISP gives you out of the box:

How ThreatCluster fits. ThreatCluster ships a public MISP feed at /misp/manifest.json — drop it into any MISP instance under Sync Actions → Feeds. Every cluster is also exportable as a STIX 2.1 bundle (TLP-marked) from the cluster page or via the API.

When you'd use one over the other

See it in the live feed.

Concepts on this page show up in the platform every day. Sign up free to see them in action.