mohlcyber / MISP-MVISION-EDR

Integration between MISP platform and McAfee MVISION EDR
Apache License 2.0
14 stars 3 forks source link

MISP - McAfee MVISION EDR integration

License

This integration adds automated hunting capabilities to the MISP platform with McAfee MVISION EDR.

Based on tagging a script will extract suspicious MD5 hashes from a threat event and will launch automated MVISION EDR lookups. If indicators found - the script will automatically re-tag the threat event, add sightings, add attributes and comments.

Screenshot 2020-02-13 at 20 42 35

Component Description

MISP threat sharing platform is a free and open source software helping information sharing of threat and cyber security indicators. https://github.com/MISP/MISP

McAfee MVISION EDR is an endpoint detection and response solution. It provides the cability to query endpoint in real-time. https://www.mcafee.com/enterprise/en-us/products/mvision-edr.html

Prerequisites

This repo includes two different ways to integrate MISP with McAfee MVISION EDR.

misp_edr.py integrates using the API's.

misp_dxl.py integrates using OpenDXL and requires McAfee Active Response Server.

misp_edr.py

PyMISP (Link)

git clone https://github.com/MISP/PyMISP.git
cd PyMISP/
python setup.py install

Access to MVISION EDR Tenant

misp_dxl.py

PyMISP (Link)

git clone https://github.com/MISP/PyMISP.git
cd PyMISP/
python setup.py install

OpenDXL SDK (Link)

git clone https://github.com/opendxl/opendxl-client-python.git
cd opendxl-client-python/
python setup.py install

OpenDXL MAR SDK (Link)

git clone https://github.com/opendxl/opendxl-mar-client-python.git
cd opendxl-mar-client-python/
python setup.py install

On-Prem McAfee ePolicy Orchestrator, DXL Broker, MVISION EDR.

Create Certificates for OpenDXL and move them into the config folder (Link).

Make sure to authorize the new created certificates in ePO to use the McAfee Active Response API (Link).

Make sure that the FULL PATH to the config file is entered in line 22.

Configuration

Enter the MISP url and access key in the python file.

Create a tag that the analyst uses to initiate the hunting process. (e.g. McAfee: Run MVISION EDR Query).

Create a tag that will be assigned to event where indicators found. (e.g. McAfee: MVISION EDR Indicator Found).

Modify the python file.

misp_url = 'https://1.1.1.1'
misp_key = ''
misp_verify = False
misp_tag = 'McAfee: Run MVISION EDR Query'
misp_ntag = 'McAfee: MVISION EDR Indicator Found'

Run the script

misp_edr.py

usage: python misp_edr.py -R <REGION> -U <USERNAME> 

MISP - McAfee EDR Integration

optional arguments:
  -h, --help            show this help message and exit
  --region {EU,US}, -R {EU,US}
                        MVISION EDR Tenant Location
  --user USER, -U USER  MVISION EDR Username
  --password PASSWORD, -P PASSWORD
                        MVISION EDR Password

misp_dxl.py

python3 misp_dxl.py

Video

IMAGE ALT TEXT HERE

link: https://youtu.be/C68cJ9XnjbI

Summary

MISP contains global, community and locally produced intelligence that can be used with McAfee MVISION EDR for automated threat hunting.