|
|
@@ -1,6 +1,7 @@
|
|
1
|
1
|
from __future__ import annotations
|
|
2
|
2
|
|
|
3
|
3
|
import hashlib
|
|
|
4
|
+import re
|
|
4
|
5
|
import time
|
|
5
|
6
|
from datetime import datetime, timezone
|
|
6
|
7
|
from typing import Any
|
|
|
@@ -112,6 +113,93 @@ class MvpService:
|
|
112
|
113
|
return str(data.get("case_id"))
|
|
113
|
114
|
return None
|
|
114
|
115
|
|
|
|
116
|
+ def _parse_kv_pairs(self, text: str) -> dict[str, str]:
|
|
|
117
|
+ pattern = r"([A-Za-z0-9_]+)=('(?:[^']*)'|\"(?:[^\"]*)\"|[^\\s]+)"
|
|
|
118
|
+ out: dict[str, str] = {}
|
|
|
119
|
+ for key, raw in re.findall(pattern, text):
|
|
|
120
|
+ value = raw.strip().strip("'").strip('"')
|
|
|
121
|
+ out[key] = value
|
|
|
122
|
+ return out
|
|
|
123
|
+
|
|
|
124
|
+ def _severity_from_rule_level(self, rule_level: Any) -> str:
|
|
|
125
|
+ try:
|
|
|
126
|
+ level = int(rule_level)
|
|
|
127
|
+ except (TypeError, ValueError):
|
|
|
128
|
+ return "medium"
|
|
|
129
|
+ if level >= 12:
|
|
|
130
|
+ return "critical"
|
|
|
131
|
+ if level >= 8:
|
|
|
132
|
+ return "high"
|
|
|
133
|
+ if level >= 4:
|
|
|
134
|
+ return "medium"
|
|
|
135
|
+ return "low"
|
|
|
136
|
+
|
|
|
137
|
+ def _event_type_from_text(self, text: str, parsed: dict[str, str]) -> str:
|
|
|
138
|
+ explicit = parsed.get("event_type")
|
|
|
139
|
+ if explicit:
|
|
|
140
|
+ return explicit
|
|
|
141
|
+ lowered = text.lower()
|
|
|
142
|
+ if "vpn" in lowered and ("geo" in lowered or "country" in lowered):
|
|
|
143
|
+ return "vpn_geo_anomaly"
|
|
|
144
|
+ if "domain" in lowered or "dns" in lowered:
|
|
|
145
|
+ return "ioc_dns"
|
|
|
146
|
+ if "c2" in lowered or "ips" in lowered or "ip " in lowered:
|
|
|
147
|
+ return "ioc_ips"
|
|
|
148
|
+ if "auth" in lowered and "fail" in lowered:
|
|
|
149
|
+ return "auth_anomaly"
|
|
|
150
|
+ return "generic"
|
|
|
151
|
+
|
|
|
152
|
+ def _normalize_wazuh_hit(self, hit: dict[str, Any]) -> dict[str, Any]:
|
|
|
153
|
+ src = hit.get("_source", {})
|
|
|
154
|
+ full_log = str(src.get("full_log", ""))
|
|
|
155
|
+ parsed = self._parse_kv_pairs(full_log)
|
|
|
156
|
+ event_id = str(parsed.get("event_id") or src.get("id") or hit.get("_id") or f"wazuh-{int(time.time())}")
|
|
|
157
|
+ timestamp = (
|
|
|
158
|
+ src.get("@timestamp")
|
|
|
159
|
+ or src.get("timestamp")
|
|
|
160
|
+ or datetime.now(timezone.utc).isoformat()
|
|
|
161
|
+ )
|
|
|
162
|
+ rule = src.get("rule", {}) if isinstance(src.get("rule"), dict) else {}
|
|
|
163
|
+ rule_desc = str(rule.get("description") or "")
|
|
|
164
|
+ event_type = self._event_type_from_text(full_log, parsed)
|
|
|
165
|
+ severity = str(parsed.get("severity", "")).lower() or self._severity_from_rule_level(rule.get("level"))
|
|
|
166
|
+
|
|
|
167
|
+ src_ip = parsed.get("src_ip")
|
|
|
168
|
+ dst_ip = parsed.get("dst_ip")
|
|
|
169
|
+ domain = parsed.get("query") or parsed.get("domain")
|
|
|
170
|
+ country = parsed.get("country")
|
|
|
171
|
+ user = parsed.get("user") or (src.get("agent", {}) or {}).get("name")
|
|
|
172
|
+
|
|
|
173
|
+ title = rule_desc or f"Wazuh alert {rule.get('id', '')}".strip()
|
|
|
174
|
+ description = full_log or rule_desc or "Wazuh alert"
|
|
|
175
|
+
|
|
|
176
|
+ return {
|
|
|
177
|
+ "source": "wazuh",
|
|
|
178
|
+ "event_type": event_type,
|
|
|
179
|
+ "event_id": event_id,
|
|
|
180
|
+ "timestamp": timestamp,
|
|
|
181
|
+ "severity": severity if severity in {"low", "medium", "high", "critical"} else "medium",
|
|
|
182
|
+ "title": title,
|
|
|
183
|
+ "description": description,
|
|
|
184
|
+ "asset": {
|
|
|
185
|
+ "user": user,
|
|
|
186
|
+ "hostname": (src.get("agent", {}) or {}).get("name"),
|
|
|
187
|
+ "agent_id": (src.get("agent", {}) or {}).get("id"),
|
|
|
188
|
+ },
|
|
|
189
|
+ "network": {
|
|
|
190
|
+ "src_ip": src_ip,
|
|
|
191
|
+ "dst_ip": dst_ip,
|
|
|
192
|
+ "domain": domain,
|
|
|
193
|
+ "country": country,
|
|
|
194
|
+ },
|
|
|
195
|
+ "tags": ["wazuh", event_type, f"rule_{rule.get('id', 'unknown')}"],
|
|
|
196
|
+ "risk_context": {
|
|
|
197
|
+ "outside_thailand": bool(country and str(country).upper() != "TH"),
|
|
|
198
|
+ },
|
|
|
199
|
+ "raw": src,
|
|
|
200
|
+ "payload": {},
|
|
|
201
|
+ }
|
|
|
202
|
+
|
|
115
|
203
|
async def ingest_incident(self, event: dict[str, Any]) -> dict[str, Any]:
|
|
116
|
204
|
policy = self.repo.get_policy()
|
|
117
|
205
|
incident_key = self._incident_key(event)
|
|
|
@@ -310,6 +398,52 @@ class MvpService:
|
|
310
|
398
|
"escalation_stub_sent": ingest_result.get("escalation_stub_sent", False),
|
|
311
|
399
|
}
|
|
312
|
400
|
|
|
|
401
|
+ async def sync_wazuh_alerts(
|
|
|
402
|
+ self,
|
|
|
403
|
+ query: str = "soc_mvp_test=true OR event_type:*",
|
|
|
404
|
+ limit: int = 50,
|
|
|
405
|
+ minutes: int = 120,
|
|
|
406
|
+ ) -> dict[str, Any]:
|
|
|
407
|
+ raw = await self.wazuh_adapter.search_alerts(query=query, limit=limit, minutes=minutes)
|
|
|
408
|
+ hits = (raw.get("hits", {}) or {}).get("hits", []) if isinstance(raw, dict) else []
|
|
|
409
|
+
|
|
|
410
|
+ processed = 0
|
|
|
411
|
+ ingested = 0
|
|
|
412
|
+ skipped_existing = 0
|
|
|
413
|
+ failed = 0
|
|
|
414
|
+ errors: list[str] = []
|
|
|
415
|
+ created_incidents: list[str] = []
|
|
|
416
|
+
|
|
|
417
|
+ for hit in hits:
|
|
|
418
|
+ processed += 1
|
|
|
419
|
+ event = self._normalize_wazuh_hit(hit)
|
|
|
420
|
+ event_id = str(event.get("event_id", "")).strip()
|
|
|
421
|
+ if event_id and self.repo.has_event("wazuh", event_id):
|
|
|
422
|
+ skipped_existing += 1
|
|
|
423
|
+ continue
|
|
|
424
|
+ try:
|
|
|
425
|
+ result = await self.ingest_incident(event)
|
|
|
426
|
+ ingested += 1
|
|
|
427
|
+ incident_key = str(result.get("incident_key", ""))
|
|
|
428
|
+ if incident_key:
|
|
|
429
|
+ created_incidents.append(incident_key)
|
|
|
430
|
+ except Exception as exc:
|
|
|
431
|
+ failed += 1
|
|
|
432
|
+ errors.append(f"{event_id or 'unknown_event'}: {exc}")
|
|
|
433
|
+
|
|
|
434
|
+ return {
|
|
|
435
|
+ "query": query,
|
|
|
436
|
+ "window_minutes": minutes,
|
|
|
437
|
+ "limit": limit,
|
|
|
438
|
+ "processed": processed,
|
|
|
439
|
+ "ingested": ingested,
|
|
|
440
|
+ "skipped_existing": skipped_existing,
|
|
|
441
|
+ "failed": failed,
|
|
|
442
|
+ "incident_keys": created_incidents,
|
|
|
443
|
+ "errors": errors[:10],
|
|
|
444
|
+ "total_hits": (raw.get("hits", {}).get("total", {}) if isinstance(raw, dict) else {}),
|
|
|
445
|
+ }
|
|
|
446
|
+
|
|
313
|
447
|
async def dependency_health(self) -> dict[str, Any]:
|
|
314
|
448
|
out: dict[str, Any] = {}
|
|
315
|
449
|
|