ESET Threat Intelligence – Table of Contents

IoC search

IoC search enables users to search for IoC (Indicators of Compromise) types, such as Botnet, C&C, Domain, File, IP, and URL in the ESET Threat Intelligence database. The data is deduplicated, and the data retention period is 90 days.


Note

IoC search is now available as a preview feature. The rate limit is 300 searches per customer per week, and the search results limit is 100 per IoC type.

The IoC search feature provides two options:

Simple search—Enables users to input a single value without specific syntax

Advanced search—Enables users to define multiple search criteria and use logical operators to narrow the search results more precisely

Simple search

Input values for the simple search are the following:

Hash (MD5, SHA-1, SHA-256)

URL

Domain name

IP address

Users can also use the wildcard string modifier—%. A wildcard acts as a placeholder for one or more characters and can match part of a string. Users can use it to search for patterns instead of exact matches when the exact value is unknown or only partially known, for example, %example.com.

Advanced search

The advanced search input can contain multiple conditions combined using operators and modifiers.

Operators for the advanced search

:—Equality operator, for example, field:value

Modifiers for the advanced search

Dates:

od/w/m/y—Supported intervals, where: d—days, w—weeks, m—months, y—years

o-—Lower than, for example, 3d-—lower than three days before

o+—Greater than, for example, 1d+—greater than one day before

Integers:

o-—Lower than, for example, 100-—lower than 100

o+—Greater than, for example, 10+—greater than 10

The advanced search syntax example: topic:domain last_seen:1d- confidence:High count:10+

Refer to the list of the fields for the advanced IoC search shown in the table.


Note

Advanced IoC search restrictions

Each field can only be used once in the search input.

Each search condition is connected by the logical operator AND.

The wildcard modifier cannot be used in the advanced search.

Using the IoC search

To use the IoC search, follow the steps below:

1.Navigate to Threat Insights > IoC Search.

2.Type the value to search for into the search bar. To use the advanced search option, click the Advanced search toggle.

3.Click the Search button.

Using the IoC search feature

4.Review the search results, including useful statistical data below the search bar. To get more information about a specific IoC from the search result, click the IoC of your interest and see the details in the opened side panel. If the IoC additionally contains a Threat name, you can see detailed information about this threat by clicking the Open Detail button in the side panel.

Opening threat details by clicking the Open Details button

5.To clear the search results, click the Clear button next to the search bar.

Fields for the advanced IoC search

Field name

Data type

Enumeration

cnc

string

 

cncs.last_alive

date

 

cncs.url

string

 

confidence

string

High

Medium

Low

count

integer

 

count_24h

integer

 

countries.code

string

 

countries.count

integer

 

countries.count_24h

integer

 

countries.country

string

 

countries.region

string

 

countries.unique_users_count_24h

integer

 

direction

string

Incoming

Outgoing

domain

string

 

domain_count

integer

 

domain_first_seen

date

 

domain_last_seen

date

 

downloaded_detection

string

 

file.count

integer

 

file.file_name

string

 

file.file_type

string

 

file.first_seen

date

 

file.md5

string

 

file.sha1

string

 

file.sha256

string

 

file.size

integer

 

file.ssdeep

string

 

file_name

string

 

file_type

string

 

first_seen

date

 

from_topic

string

 

host

string

 

ip

string

 

last_alive

date

 

last_seen

date

 

location

string

 

md5

string

 

opener_detection

string

 

port

string

 

prot_l4

string

 

prot_l7

string

 

protocol

string

 

reason

string

 

sha1

string

 

sha256

string

 

size

integer

 

ssdeep

string

 

state

string

Blocked

Phishing

Unwanted

BlockedObject

threat

string

 

topic

string

botnet

cc

domain

file

ip

url

url

string

 

valid_to

date