wazuh-kibana-app/server/reporting/audit-request.js
2018-07-12 17:01:54 +02:00

230 lines
8.1 KiB
JavaScript

/*
* Wazuh app - Specific methods to fetch Wazuh Audit data from Elasticsearch
* Copyright (C) 2018 Wazuh, Inc.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* Find more information about this on the LICENSE file.
*/
import ElasticWrapper from '../lib/elastic-wrapper';
import AuditMap from './audit-map';
export default class PciRequest {
/**
* Constructor
* @param {*} server Hapi.js server object provided by Kibana
*/
constructor(server) {
this.wzWrapper = new ElasticWrapper(server);
}
/**
* Returns top 3 agents that execute sudo commands without success
* @param {*} gte
* @param {*} lte
* @param {*} filters
* @param {*} pattern
*/
async getTop3AgentsSudoNonSuccessful(gte, lte, filters, pattern = 'wazuh-alerts-3.x-*') {
try {
const base = {
pattern,
"size": 0,
"aggs": {
"3": {
"terms": {
"field": "agent.id",
"size": 3,
"order": {
"_count": "desc"
}
}
}
},
"stored_fields": [
"*"
],
"script_fields": {},
"docvalue_fields": [
"@timestamp",
"data.vulnerability.published",
"data.vulnerability.updated",
"syscheck.mtime_after",
"syscheck.mtime_before",
"data.cis.timestamp"
],
"query": {
"bool": {
"must": [
{
"query_string": {
"query": filters,
"analyze_wildcard": true,
"default_field": "*"
}
},
{
"range": {
"@timestamp": {
"gte": gte,
"lte": lte,
"format": "epoch_millis"
}
}
},
{
"match_phrase": {
"data.audit.uid": {
"query": "0"
}
}
},
{
"match_phrase": {
"data.audit.success": {
"query": "no"
}
}
}
],
"must_not": [
{
"match_phrase": {
"data.audit.auid": {
"query": "0"
}
}
}
]
}
}
};
const response = await this.wzWrapper.searchWazuhAlertsWithPayload(base);
const { buckets } = response.aggregations['3'];
return buckets.map(item => item.key);
} catch (error) {
return Promise.reject(error);
}
}
/**
* Returns the most failed syscall in the top 3 agents with failed system calls
* @param {*} gte
* @param {*} lte
* @param {*} filters
* @param {*} pattern
*/
async getTop3AgentsFailedSyscalls(gte, lte, filters, pattern = 'wazuh-alerts-3.x-*') {
try {
const base = {
pattern,
"size": 0,
"aggs": {
"3": {
"terms": {
"field": "agent.id",
"size": 3,
"order": {
"_count": "desc"
}
},
"aggs": {
"4": {
"terms": {
"field": "data.audit.syscall",
"size": 1,
"order": {
"_count": "desc"
}
}
}
}
}
},
"stored_fields": [
"*"
],
"script_fields": {},
"docvalue_fields": [
"@timestamp",
"data.vulnerability.published",
"data.vulnerability.updated",
"syscheck.mtime_after",
"syscheck.mtime_before",
"data.cis.timestamp"
],
"query": {
"bool": {
"must": [
{
"query_string": {
"query": filters,
"analyze_wildcard": true,
"default_field": "*"
}
},
{
"range": {
"@timestamp": {
"gte": gte,
"lte": lte,
"format": "epoch_millis"
}
}
},
{
"match_phrase": {
"data.audit.uid": {
"query": "0"
}
}
},
{
"match_phrase": {
"data.audit.success": {
"query": "no"
}
}
}
],
"must_not": [
{
"match_phrase": {
"data.audit.auid": {
"query": "0"
}
}
}
]
}
}
};
const response = await this.wzWrapper.searchWazuhAlertsWithPayload(base);
const { buckets } = response.aggregations['3'];
const result = [];
for (const bucket of buckets) {
try {
const agent = bucket.key;
const syscall = { id: bucket['4'].buckets[0].key, syscall: AuditMap[bucket['4'].buckets[0].key] || 'Warning: Unknown system call' };
result.push({
agent, syscall
});
} catch (error) {
continue;
}
}
return result;
} catch (error) {
return Promise.reject(error);
}
}
}