# Playbooks de Resposta Procedimentos operacionais de Incident Response (IR) e Threat Hunting baseados em inteligência de ameaças. Cada playbook cobre detecção, triagem, contenção, erradicação e recuperação para uma ameaça ou categoria específica. > [!warning] Uso Responsável > Todos os playbooks são pontos de partida baseados em fontes abertas. Adapte ao seu ambiente antes de usar em produção. Não substituem um plano formal de IR. --- ```mermaid graph TB subgraph lifecycle["Ciclo de Resposta a Incidentes"] PREP["Preparação"] --> DET["Detecção<br/>e Análise"] DET --> CONT["Contenção"] CONT --> ERAD["Erradicação"] ERAD --> REC["Recuperação"] REC --> LESS["Lições<br/>Aprendidas"] LESS -.->|"retroalimentação"| PREP end classDef phase fill:#1a3a5c,color:#fff,stroke:#2980b9 class PREP,DET,CONT,ERAD,REC,LESS phase ``` --- ## Playbooks de Incident Response %% ```dataview TABLE WITHOUT ID link(file.link, title) AS "Playbook", severity AS "Severidade", length(triggers) AS "Triggers", length(techniques-covered) AS "TTPs" FROM "defenses/playbooks" WHERE type = "playbook" AND playbook-category = "incident-response" SORT severity ASC ``` %% <!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, title) AS "Playbook", severity AS "Severidade", length(triggers) AS "Triggers", length(techniques-covered) AS "TTPs" FROM "defenses/playbooks" WHERE type = "playbook" AND playbook-category = "incident-response" SORT severity ASC --> <!-- SerializedQuery: TABLE WITHOUT ID link(file.link, title) AS "Playbook", severity AS "Severidade", length(triggers) AS "Triggers", length(techniques-covered) AS "TTPs" FROM "defenses/playbooks" WHERE type = "playbook" AND playbook-category = "incident-response" SORT severity ASC --> | Playbook | Severidade | Triggers | TTPs | | ------------------------------------------------------------------------------------------------------------------------------ | ---------- | -------- | ---- | | [[ir-apt-espionage-latam\|IR Playbook - Espionagem APT em LATAM]] | critical | 6 | 6 | | [[ir-apt29-espionage\|IR Playbook - APT29 Espionagem]] | critical | 3 | 5 | | [[ir-cloud-account-compromise\|IR Playbook - Comprometimento de Conta Cloud]] | critical | 3 | 7 | | [[ir-data-exfiltration\|IR Playbook - Resposta a Exfiltração de Dados]] | critical | 3 | 6 | | [[ir-fortimanager-exploitation\|IR Playbook - FortiManager Exploitation]] | critical | 3 | 3 | | [[ir-fortinet-legacy-exploitation\|Playbook - Resposta a Exploração de FortiOS Legacy (CVE-2022-40684)]] | critical | 1 | 3 | | [[ir-pan-os-exploitation\|IR Playbook - PAN-OS Exploitation]] | critical | 3 | 3 | | [[ir-pix-fraud-android\|IR Playbook - Fraude PIX via Malware Android]] | critical | 6 | 5 | | [[ir-ransomware-akira\|IR Playbook - Ransomware Akira]] | critical | 4 | 6 | | [[ir-phishing-bec\|IR Playbook - Phishing e BEC]] | critical | 3 | 8 | | [[ir-supply-chain-attack\|IR Playbook - Comprometimento de Cadeia de Suprimentos]] | critical | 4 | 5 | | [[ir-supply-chain-latam\|IR Playbook - Ataque Supply Chain LATAM]] | critical | 4 | 5 | | [[ir-vmware-exploitation\|Playbook - Resposta a Exploração de VMware ESXi/vCenter]] | critical | 2 | 3 | | [[ir-webshell-compromise\|IR Playbook - Webshell e Comprometimento de Aplicação Web]] | critical | 2 | 7 | | [[ir-zero-day-response\|IR Playbook - Resposta a Zero-Day]] | critical | 3 | 6 | | [[ir-credential-theft\|IR Playbook - Roubo de Credenciais / Infostealer]] | high | 3 | 5 | | [[ir-ddos-response\|IR Playbook - Resposta a Ataque DDoS]] | high | 2 | 4 | | [[ir-insider-threat\|IR Playbook - Ameaça Interna (Insider Threat)]] | high | 3 | 8 | <!-- SerializedQuery END --> --- ## Playbooks de Threat Hunting %% ```dataview TABLE WITHOUT ID link(file.link, title) AS "Playbook", severity AS "Severidade", length(techniques-covered) AS "TTPs Cobertos" FROM "defenses/playbooks" WHERE type = "playbook" AND playbook-category = "threat-hunting" SORT file.mtime DESC ``` %% <!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, title) AS "Playbook", severity AS "Severidade", length(techniques-covered) AS "TTPs Cobertos" FROM "defenses/playbooks" WHERE type = "playbook" AND playbook-category = "threat-hunting" SORT file.mtime DESC --> <!-- SerializedQuery: TABLE WITHOUT ID link(file.link, title) AS "Playbook", severity AS "Severidade", length(techniques-covered) AS "TTPs Cobertos" FROM "defenses/playbooks" WHERE type = "playbook" AND playbook-category = "threat-hunting" SORT file.mtime DESC --> | Playbook | Severidade | TTPs Cobertos | | ------------------------------------------------------------------------------------------------------------- | ---------- | ------------- | | [[hunting-lateral-movement\|Hunting - Movimentação Lateral]] | high | 7 | | [[hunting-discovery-enumeration\|Hunting - Enumeração e Discovery Pós-Comprometimento]] | high | 6 | | [[hunting-scheduled-task-persistence\|Hunting - Persistência via Tarefas Agendadas]] | high | 3 | | [[hunting-data-exfiltration\|Hunting - Exfiltração de Dados]] | critical | 6 | | [[hunting-powershell-abuse\|Hunting - Abuso de PowerShell e Execução de Scripts]] | critical | 4 | | [[hunting-persistence-mechanisms\|Hunting - Mecanismos de Persistência]] | high | 10 | | [[hunting-credential-dumping\|Hunting - Credential Dumping e Credential Access]] | critical | 6 | | [[hunting-initial-access-brokers\|Hunting - Initial Access Brokers (IABs)]] | high | 8 | | [[hunting-supply-chain-compromise\|Hunting - Supply Chain Compromise]] | high | 3 | | [[hunting-c2-beacon-detection\|Hunting - Detecção de Beacons C2]] | critical | 8 | | [[hunting-c2-beaconing\|Hunting - C2 Beaconing (Cobalt Strike, Brute Ratel, Sliver)]] | high | 6 | <!-- SerializedQuery END --> --- ## Últimas Atualizações %% ```dataview TABLE WITHOUT ID link(file.link, title) AS "Playbook", type AS "Tipo", dateformat(file.mtime, "yyyy-MM-dd HH:mm") AS "Modificado" FROM "defenses/playbooks" WHERE publish = true AND !contains(file.name, "_") SORT file.mtime DESC LIMIT 5 ``` %% <!-- QueryToSerialize: TABLE WITHOUT ID link(file.link, title) AS "Playbook", type AS "Tipo", dateformat(file.mtime, "yyyy-MM-dd HH:mm") AS "Modificado" FROM "defenses/playbooks" WHERE publish = true AND !contains(file.name, "_") SORT file.mtime DESC LIMIT 5 --> <!-- SerializedQuery: TABLE WITHOUT ID link(file.link, title) AS "Playbook", type AS "Tipo", dateformat(file.mtime, "yyyy-MM-dd HH:mm") AS "Modificado" FROM "defenses/playbooks" WHERE publish = true AND !contains(file.name, "_") SORT file.mtime DESC LIMIT 5 --> | Playbook | Tipo | Modificado | | ------------------------------------------------------------------------------------------------------------- | -------- | ---------------- | | [[ir-ddos-response\|IR Playbook - Resposta a Ataque DDoS]] | playbook | 2026-03-30 02:37 | | [[hunting-lateral-movement\|Hunting - Movimentação Lateral]] | playbook | 2026-03-30 02:34 | | [[hunting-discovery-enumeration\|Hunting - Enumeração e Discovery Pós-Comprometimento]] | playbook | 2026-03-30 02:34 | | [[ir-credential-theft\|IR Playbook - Roubo de Credenciais / Infostealer]] | playbook | 2026-03-30 02:34 | | [[hunting-scheduled-task-persistence\|Hunting - Persistência via Tarefas Agendadas]] | playbook | 2026-03-30 02:34 | <!-- SerializedQuery END --> --- > [!tip] Fontes > Playbooks baseados em NIST SP 800-61, SANS Incident Handler's Handbook e procedimentos públicos de resposta a incidentes documentados por CrowdStrike, Mandiant e Microsoft DART.