ESET Threat Intelligence – Table of Contents

MISP

The ESET Malware Information Sharing Platform (MISP) server contains IoCs described in the reports. Every time a new report is available, the administrator receives an email notification. Historical reports are also available.

Scripts to interact with ESET MISP

There are scripts developed to help users interact with ESET MISP. Currently, the following scripts are available:

YARA extractor—enables users to retrieve YARA rules from reports published on MISP and utilize these rules in their system

Threat Actor's Region extractor—enables users to retrieve the region of the Threat Actor from reports published on MISP

You can find the scripts, their usage examples, and information about common queries to help you interact with ESET MISP on GitHub.

To use scripts or automation tools with the MISP server, you need your MISP API key. You can find your MISP API key on the ESET Malware Information Sharing Platform > Automation.

MISP API key value displayed on the Automation page

Reports in MISP

The reports in MISP are accessible by the ETI (ESET Threat Intelligence) Portal download link to PDF and ETI Portal Report UUID. The ETI Portal download link to PDF and ETI Portal Report UUID are provided as object attributes of the MISP Event. Refer to the example below.

ETI Portal Report ID:

"type": "other"

"category": "External analysis"

"comment": "ETI Portal Report ID"

"value": ETI Portal Report ID in the format of UUID, for example, "1351b9c3-b176-4de3-9234-2fe03c2913d5"

ETI Portal download link (PDF):

"type": "other"

"category": "External analysis"

"comment": "ETI Portal download link (PDF)"

"value": ETI Portal download link to PDF, for example, "https://eti.eset.com/reports/apt/download/1351b9c3-b176-4de3-9234-2fe03c2913d5"

ETI Portal Report ID

ETI Portal Report ID can be used with the ESET Threat Intelligence APIv2.

The ESET Threat Intelligence API documentation (Swagger/OpenAPI) is available through the provided link. To use the ESET Threat Intelligence API, you must have the ESET Threat Intelligence Portal API credentials generated.

For the APT (Advanced Persistent Threat) report download PDF link, use the https://eti.eset.com/api/v2/apt-reports/{reportUuid}/files endpoint. Alternatively, you can use the direct API download link: https://eti.eset.com/api/v2/apt-reports/{reportUuid}/download/pdf.

ETI Portal download link (PDF)

The ETI Portal download link (PDF) directs to the ESET Threat Intelligence Portal UI, which requires authentication using your ESET Business Account/ESET PROTECT Hub login credentials. MISP UI and ESET Threat Intelligence Portal UI users can use the link to download PDFs in the browser.

JSON

Below is an example of a MISP Event in JSON format.