Skip to main content

Threat Data

Intel Exchange segregates the different formats of threat intel received into STIX objects such as indicators, vulnerabilities, TTPs, malware, campaign, threat actor, intrusion set, attack pattern, incident, course of action, identity, kill chain, kill chain phases, and tool.

Threat Data gives you a comprehensive description of all the elements and attributes of the threat intel objects in Intel Exchange.

Note

You must have View Threat Data permission to access Threat Data and to utilize its functions. Only your Intel Exchange admin can assign access permissions to the User Groups.