Threat Object

The threat object describes the classification of known threats, as reported by a detection engine.
Name Attribute Requirement Type Description
ClassificationЕxt classification Optional String The threat classification.
Classification IDs classification_ids Recommended Integer Array The array of threat classifications.
0Unclassified
1Ad Clicker
2ADS
3Adware
4Android
5APT
6Backdoor
7Banker
8Banking
9Bitcoin
10Bitcoin miner
11Bootkit
12Bot
13Botnet
14Browser Hijack
15Browser Modifier
16Bundle Installer
17Clicker
18Click Fraud
19DDOS
20Destructive
21Dialer
22DOS
23Downloader
24Downware
25Dropper
26EmailWorm
27Evasion
28Exploit
29FakeAV
30File Infector
31Gaming
32Hack Tool
33Info
34Injector
35iOS
36IRCBot
37Key Logger
38Kill AV
39Macro
40Mass Mailer
41Miner
42More Info
43Password Stealer
44POS
45POST
46Power Shell
47Proxy
48Proxy Avoidance
49PUA
50PWS
51Ransom
52Ransomware
53RAT
54Remote Admin
55Riskware
56Rootkit
57SMS-Send
58SMS Worm
59SMTP Client
60Spam
61Spy
62Spyware
63Start Page
64Test tool
65Toolbar
66TOR
67Trojan
68Virus
69Web Injects
70WMI
71Worm
72Man in the Middle (MITM)
73Suspicious Network
74SMS Phishing
75C&C Server
CVE IDЕxt cve_uid Optional String The common vulnerabilities and exposures (CVE) identifier.
ID id Recommended Long The threat identifier as reported by the detection engine; for example a virus id or an IPS signature id.
Name name Recommended String The threat name as reported by the detection engine.
ProviderЕxt provider Optional String The origin of the reputation and category information. For example: "CAS", "CASMA", "Cynic", "Skeptic", or "Synapse".
Risk risk_id Recommended Integer The cumulative risk rating of the threat as defined by the Foresight policy.
0Unknown
100Bad
200Somewhat Bad
300Neutral
400Somewhat Good
500Untrusted
Threat Sub IDЕxt sub_id Optional Integer The threat sub identifier as reported by the detection engine.

Note: Pertains only to IPS threats.

Type type_id Recommended Integer The threat type as reported by the detection engine.
1Malware
2Behavioral
3Potentially Unwanted Applications
4Exploit (PEP)
5Heuristic
6Security Risk