Threat ID [7.2]
The ID number of a threat when available from an IDS/IPS signature, endpoint protection, or firewall log.
This field is not available in LogRhythm versions earlier than 7.2.1.
Data Type
String
Aliases
| Use | Alias | 
|---|---|
Client Console Full Name  | Not applicable  | 
Client Console Short Name  | Not applicable  | 
Web Console Tab/Name  | Threat ID  | 
Elasticsearch Field Name  | threatId  | 
Rule Builder Column Name  | ThreatID  | 
Regex Pattern  | <threatid>  | 
NetMon Name  | Not applicable  | 
Field Relationships
- Threat Name
 - VMID
 - Vendor Message
 - Object
 - Object Name
 - Object Type
 - Process
 - Process ID
 
Common Applications
- IDS/IPS
 - Vulnerability scanners
 - Proxy
 
Use Case
Correlating threats.
MPE/Data Masking Manipulations
Not applicable.
Usage Standards
- Signatures
 - Numeric or string identifiers for threats under different names
 
Examples
- Cisco IDS/IPS
 
<sd:evIdsAlert eventId="222222222" vendor="Cisco" severity="high" xmlns:sd="http://example.org/2003/08/sdee">bhiips xmlns:cid="http://www.cisco.com/cids/2006/08/cidee">sensorApp xmlns:cid="http://www.cisco.com/cids/2006/08/cidee">9055 offset="-300" timeZone="GMT-05:00">1232562570119108000</sd:time><sd:signature description="MSSQL Resolution Service Stack Overflow" id="4703" cid:version="S367" cid:type="other" cid:created="20000101" xmlns:cid="http://www.cisco.com/cids/2006/08/cidee">0 sample truncated. 
Signature ID of a threat detectedeStreamer.
- eStreamer
 
LOGTYPE=INT_EVT_51_IPV4 R_ID=24105 R_REV=9 S_IP=1.1.1.1 S_PORT=58730 D_IP=1.1.1.1 D_PORT=8080 U_ID=0 U= R_NAME=MALWARE-OTHER HTTP POST request to a GIF file CLASSIFICATION_ID=22 CLASSIFICATION=Detection of a Non-Standard Protocol or Event PROT_NUM=6 PROT= ING_IF=s1p5 EG_IF=s1p1 BLOCKED=NotBlocked MANAGED_DEV_ID=9 EVT_ID=263305 EVT_T=01/15/2015 20:42:56 GEN_ID=1 PRI_ID=2 PRI=medium IMPACT_FLAGS=MonitoredHost, MappedHost, ServerPortOrIp IMPACT=Orange BBQ_LABEL=0 VLAN_ID=0 POL=Intrusion Policy - Corporate AP_PROT=HTTP ACS_CTL_R=File Inspection Rule ACS_CTL_POL=Access Control Policy - CORPORATE nnq_nnq_Z=Corporate EG_bbq_Z=OOB
R_ID=24105 is the Threat ID from this IDS signature log.
- Symantec Endpoint
 
05 22 2014 11:08:02 1.1.1.1 <LPTR:CRIT> May 22 10:55:13 SymantecServer USABLDRRECFLOW01: USABLDRRECFLOW01,[SID: 25238] Fake App Attack: Misleading Application Website attack blocked. Traffic has been blocked for this application: \DEVICE\HARDDISKVOLUME1\PROGRAM FILES\GOOGLE\CHROME\APPLICATION\CHROME.EXE,Local: 1.1.1.1,Local: 000000000000,Remote: ,Remote: 1.1.1.1,Remote: 000000000000,Inbound,TCP,Intrusion ID: 0,Begin: 2014-05-22 10:53:42,End: 2014-05-22 10:53:42,Occurrences: 1,Application: /DEVICE/HARDDISKVOLUME1/PROGRAM FILES/GOOGLE/CHROME/APPLICATION/CHROME.EXE,Location: Coprorate Network,User: Christina_McCloud,Domain: INDY,Local Port 4295,Remote Port 80,CIDS Signature ID: 25238,CIDS Signature string: Fake App Attack: Misleading Application Website,CIDS Signature SubID: 70185,Intrusion URL: pcfaster.info/usdown/?sence=asdifas892nsndsafusaljnsxckad,Intrusion Payload URL:
SID is the signature ID of the detected threat.