To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.
This is a summary describing a grouping of datasets. The full list is show below. Please request the sub-datasets individually.

Summary

DS-1190
Cyber Threat Indicators
Dataset
DHS Cybersecurity and Infrastructure Security Agency
DHS Cybersecurity and Infrastructure Security Agency
01/01/2016
12/31/2018
49 (lowest rank is 49)

Category & Restrictions

Other
cyber attack
Unrestricted
true

Description


Cyber threat Indicators

In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicators in a machine-readable (XML) format between the Federal Government and the private sector. Threat indicators are pieces of information like malicious IP addresses or the sender address of a phishing email (although they can also be much more complicated).

Organizations sharing indicators use the Traffic Light Protocol (TLP) (https://www.us-cert.gov/tlp ) to mark the indicators for sensitivity and control how widely they can be shared. While AIS exchanges TLP White, Green, and Amber indicators, the indicators available on this site are just the ones marked TLP White from CY16 through CY18. If you are interested in receiving all the AIS indicators and in near-real-time as they are exchanged, more information on how to directly participate in AIS is available at https://www.us-cert.gov/ais .

The AIS indicators available on this site are in the Structured Threat Information Expression (STIX) version 1.1 XML format. Additional information about STIX 1.x can be found at https://stixproject.github.io/, while specific AIS field information is documented at https://www.us-cert.gov/sites/default/files/ais_files/AIS_Submission_Guidance_Appendix_A.pdf .

Additional Details

48.1MB
false
cybercrime, spamming, information sensitivity, cryptographic protocol, communication protocol, application layer protocols, data serialization formats, transport layer security, real time computing, dhs cybersecurity and infrastructure security agency, xml, embedded system, internet protocol, email, 1190, phishing, uniform resource identifier, github, hypertext transfer protocol, internet security, computer file formats, technical communication, cyberwarfare, secure communication, history of computing, cyberattack, traffic light protocol, cyber threat indicators, threat, exploit

Dataset Group


This is the summary for the group