Threat Data
CTIX segregates the different formats of threat intel received into STIX objects such as indicators, vulnerabilities, TTPs, malware, campaign, threat actor, intrusion set, attack pattern, incident, course of action, identity, kill chain, kill chain phases, and tool.
Threat Data gives you a comprehensive description of all the elements and attributes of the threat intel objects in CTIX.
Note
You must have View Threat Data permission to access Threat Data and to utilize its functions. Only your CTIX admin can assign access permissions to the User Groups.