This integration adds automated hunting capabilities to the MISP platform with McAfee MVISION EDR.
Based on tagging a script will extract suspicious MD5 hashes from a threat event and will launch automated MVISION EDR lookups. If indicators found - the script will automatically re-tag the threat event, add sightings, add attributes and comments.
MISP threat sharing platform is a free and open source software helping information sharing of threat and cyber security indicators. https://github.com/MISP/MISP
McAfee MVISION EDR is an endpoint detection and response solution. It provides the cability to query endpoint in real-time. https://www.mcafee.com/enterprise/en-us/products/mvision-edr.html
This repo includes two different ways to integrate MISP with McAfee MVISION EDR.
misp_edr.py integrates using the API's.
misp_dxl.py integrates using OpenDXL and requires McAfee Active Response Server.
PyMISP (Link)
git clone https://github.com/MISP/PyMISP.git
cd PyMISP/
python setup.py install
Access to MVISION EDR Tenant
PyMISP (Link)
git clone https://github.com/MISP/PyMISP.git
cd PyMISP/
python setup.py install
OpenDXL SDK (Link)
git clone https://github.com/opendxl/opendxl-client-python.git
cd opendxl-client-python/
python setup.py install
OpenDXL MAR SDK (Link)
git clone https://github.com/opendxl/opendxl-mar-client-python.git
cd opendxl-mar-client-python/
python setup.py install
On-Prem McAfee ePolicy Orchestrator, DXL Broker, MVISION EDR.
Create Certificates for OpenDXL and move them into the config folder (Link).
Make sure to authorize the new created certificates in ePO to use the McAfee Active Response API (Link).
Make sure that the FULL PATH to the config file is entered in line 22.
Enter the MISP url and access key in the python file.
Create a tag that the analyst uses to initiate the hunting process. (e.g. McAfee: Run MVISION EDR Query).
Create a tag that will be assigned to event where indicators found. (e.g. McAfee: MVISION EDR Indicator Found).
Modify the python file.
misp_url = 'https://1.1.1.1'
misp_key = ''
misp_verify = False
misp_tag = 'McAfee: Run MVISION EDR Query'
misp_ntag = 'McAfee: MVISION EDR Indicator Found'
usage: python misp_edr.py -R <REGION> -U <USERNAME>
MISP - McAfee EDR Integration
optional arguments:
-h, --help show this help message and exit
--region {EU,US}, -R {EU,US}
MVISION EDR Tenant Location
--user USER, -U USER MVISION EDR Username
--password PASSWORD, -P PASSWORD
MVISION EDR Password
python3 misp_dxl.py
link: https://youtu.be/C68cJ9XnjbI
MISP contains global, community and locally produced intelligence that can be used with McAfee MVISION EDR for automated threat hunting.