Threat Data
Intel Exchange segregates the different formats of threat intel received into STIX objects such as indicators, vulnerabilities, TTPs, malware, campaign, threat actor, intrusion set, attack pattern, incident, course of action, identity, kill chain, kill chain phases, and tool.
Threat Data gives you a comprehensive description of all the elements and attributes of the threat intel objects in Intel Exchange.
Note
You must have View Threat Data permission to access Threat Data and to utilize its functions. Only your Intel Exchange admin can assign access permissions to the User Groups.