MISP - McAfee MVISION EDR integration
This integration adds automated hunting capabilities to the MISP platform with McAfee MVISION EDR.
Based on tagging a script will extract suspicious MD5 hashes from a threat event and will launch automated MVISION EDR lookups. If indicators found - the script will automatically re-tag the threat event, add sightings, add attributes and comments.
Component Description
MISP threat sharing platform is a free and open source software helping information sharing of threat and cyber security indicators. https://github.com/MISP/MISP
McAfee MVISION EDR is an endpoint detection and response solution. It provides the cability to query endpoint in real-time. https://www.mcafee.com/enterprise/en-us/products/mvision-edr.html
Prerequisites
This repo includes two different ways to integrate MISP with McAfee MVISION EDR.
misp_edr.py integrates using the API's.
misp_dxl.py integrates using OpenDXL and can be used for McAfee Active Response as well.
misp_edr.py
PyMISP (Link)
git clone https://github.com/MISP/PyMISP.git
cd PyMISP/
python setup.py install
Access to MVISION EDR Tenant
misp_dxl.py
PyMISP (Link)
git clone https://github.com/MISP/PyMISP.git
cd PyMISP/
python setup.py install
OpenDXL SDK (Link)
git clone https://github.com/opendxl/opendxl-client-python.git
cd opendxl-client-python/
python setup.py install
OpenDXL MAR SDK (Link)
git clone https://github.com/opendxl/opendxl-mar-client-python.git
cd opendxl-mar-client-python/
python setup.py install
On-Prem McAfee ePolicy Orchestrator, DXL Broker, MVISION EDR.
Create Certificates for OpenDXL and move them into the config folder (Link).
Make sure to authorize the new created certificates in ePO to use the McAfee Active Response API (Link).
Make sure that the FULL PATH to the config file is entered in line 22.
Configuration
Enter the MISP url and access key in the python file.
Create a tag that the analyst uses to initiate the hunting process. (e.g. McAfee: Run MVISION EDR Query).
Create a tag that will be assigned to event where indicators found. (e.g. McAfee: MVISION EDR Indicator Found).
Modify the python file.
misp_url = 'https://1.1.1.1'
misp_key = ''
misp_verify = False
misp_tag = 'McAfee: Run MVISION EDR Query'
misp_ntag = 'McAfee: MVISION EDR Indicator Found'
Run the script
misp_edr.py
usage: python misp_edr.py -R <REGION> -U <USERNAME>
MISP - McAfee EDR Integration
optional arguments:
-h, --help show this help message and exit
--region {EU,US}, -R {EU,US}
MVISION EDR Tenant Location
--user USER, -U USER MVISION EDR Username
--password PASSWORD, -P PASSWORD
MVISION EDR Password
misp_dxl.py
python3 misp_dxl.py
Video
link: https://youtu.be/C68cJ9XnjbI
Summary
MISP contains global, community and locally produced intelligence that can be used with McAfee MVISION EDR for automated threat hunting.