ESET Threat Intelligence – Table of Contents

MISP

The ESET Malware Information Sharing Platform (MISP) server contains IoCs described in the reports. Every time a new report is available, the administrator receives an email notification. Historical reports are also available.

Integration, automation and interaction with ESET APT MISP

Access ESET APT MISP from the ESET Threat Intelligence Portal > APT Reports > Access MISP.

Based on the ESET Threat Intelligence MISP access model that uses read-only accounts, we recommend using the MISP API for easier integration and automation. MISP API offers a simple way for integration and automation tasks.

To use automation, ensure you have your MISP API key. You can find your MISP API key on the ESET Malware Information Sharing Platform > Automation:

MISP API key value displayed on the Automation page

Basic MISP API usage examples

Download a specific event:

Download all events:

Upload events to the target MISP:

To simplify usage of the MISP API, consider utilizing the PyMISP Python library, PyMISP Python library on GitHub or ESET Threat Intelligence examples of common queries, which are inspired by the PyMISP documentation and examples.

Also, there are scripts to help you interact with ESET MISP, such as:

YARA extractor—enables you to retrieve YARA rules from reports published on MISP and utilize these rules in their system

Threat Actor's Region extractor—enables you to retrieve the region of the Threat Actor from reports published on MISP

You can find the scripts, their usage examples, and information about common queries on GitHub.

Reports in MISP

The reports in MISP are accessible by the ETI (ESET Threat Intelligence) Portal download link (PDF) and ETI Portal Report UUID. The ETI Portal download link (PDF) and ETI Portal Report UUID are provided as object attributes of the MISP Event. Refer to the example below.

ETI Portal Report ID:

ETI Portal download link (PDF):

ETI Portal Report ID

ETI Portal Report ID can be used with the ESET Threat Intelligence APIv2.

The ESET Threat Intelligence API documentation (Swagger/OpenAPI) is available through the provided link. To use the ESET Threat Intelligence API, you must have the ESET Threat Intelligence Portal API credentials generated.

For the APT (Advanced Persistent Threat) report download link (PDF), use the https://eti.eset.com/api/v2/apt-reports/{reportUuid}/files endpoint. Alternatively, you can use the direct API download link: https://eti.eset.com/api/v2/apt-reports/{reportUuid}/download/pdf.

ETI Portal download link (PDF)

The ETI Portal download link (PDF) directs to the ESET Threat Intelligence Portal UI, which requires authentication using your ESET Business Account/ESET PROTECT Hub login credentials. MISP UI and ESET Threat Intelligence Portal UI users can use the link to download PDFs in the browser.

JSON

Below is an example of a MISP Event in JSON format.