Перечень правил детектирования

Данная таблица содержит список разработанных правил детектирования. Для каждого правила указано, к какой информационной системе оно относится, а также какие тактики и техники MITRE ATT&CK оно затрагивает.

Вендор Продукт ID правила детектирования Название правила детектирования Тактика MITRE ATT&CK Техника, сабтехника MITRE ATT&CK Источник события

Все вендоры

-

RV-D-740

Обнаружен индикатор компрометации

TA0001 (Initial Access), TA0011 (Command and Control), TA0010 (Exfiltration)

T1041 (Exfiltration Over C2 Channel), T1071 (Application Layer Protocol), T1071.001 (Application Layer Protocol: Web Protocols), T1071.004 (Application Layer Protocol: DNS), T1105 (Ingress Tool Transfer), T1204 (User Execution), T1204.001 (User Execution: Malicious Link), T1219 (Remote Access Tools), T1566 (Phishing), T1566.001 (Phishing: Spearphishing Attachment), T1566.002 (Phishing: Spearphishing Link), T1566.003 (Phishing: Spearphishing via Service)

-

Гарда

Гарда WAF

RV-D-701

Подбор пароля пользователя к Garda WAF

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing), T1110.003 (Brute Force: Password Spraying)

Гарда WAF

Гарда

Гарда WAF

RV-D-702

Атака Password Spraying к Garda WAF

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing), T1110.003 (Brute Force: Password Spraying)

Гарда WAF

Гарда

Гарда WAF

RV-D-703

Успешный подбор пароля к Garda WAF

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing), T1110.003 (Brute Force: Password Spraying)

Гарда WAF

Гарда

Гарда WAF

RV-D-704

Отключение или изменение паттерна Garda WAF

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Гарда WAF

Гарда

Гарда WAF

RV-D-705

Атака на веб-приложение Garda WAF

TA0001 (Initial Access), TA0003 (Persistence)

T1190 (Exploit Public-Facing Application), T1505 (Server Software Component), T1505.003 (Server Software Component: Web Shell)

Гарда WAF

Гарда

Гарда WAF

RV-D-706

Множественная атака на веб-приложение Garda WAF

TA0001 (Initial Access), TA0003 (Persistence)

T1190 (Exploit Public-Facing Application), T1505 (Server Software Component), T1505.003 (Server Software Component: Web Shell)

Гарда WAF

Гарда

Гарда WAF

RV-D-707

Множественные атаки на веб-приложение Garda WAF

TA0001 (Initial Access), TA0003 (Persistence)

T1190 (Exploit Public-Facing Application), T1505 (Server Software Component), T1505.003 (Server Software Component: Web Shell)

Гарда WAF

Гарда

Гарда WAF

RV-D-708

Добавление пользователю критичной роли Garda WAF

TA0003 (Persistence)

T1098 (Account Manipulation), T1098.007 (Account Manipulation: Additional Local or Domain Groups)

Гарда WAF

Гарда

Гарда WAF

RV-D-723

Изменение настроек защиты подключенного сервера

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Гарда WAF

Гарда

Гарда WAF

RV-D-724

Массовое удаление УЗ Garda WAF

TA0040 (Impact)

T1531 (Account Access Removal)

Гарда WAF

Код Безопасности

Континент

RV-D-79

Успешный подбор пароля к серверу Континент TLS

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

Код Безопасности

Континент

RV-D-80

Подбор пароля к серверу Континент TLS

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

Код Безопасности

Континент

RV-D-81

Подбор пароля Континент методом Password Spraying

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

-

Код Безопасности

Континент

RV-D-82

Вход привилегированного пользователя на устройство Континент с неизвестного хоста

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

-

Код Безопасности

Secret Net Studio

RV-D-496

Очищен журнал событий Secret Net Studio

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.009 (Indicator Removal: Clear Persistence)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-497

Вход пользователя из черного списка

TA0001 (Initial Access), TA0005 (Defense Evasion)

T1078 (Valid Accounts)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-498

Нарушение целостности объекта системы

TA0040 (Impact)

T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-499

Массовая разблокировка узлов Secret Net Studio

TA0005 (Defense Evasion)

T1211 (Exploitation for Defense Evasion)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-500

Массовая блокировка узлов Secret Net Studio

TA0040 (Impact)

T1499 (Endpoint Denial of Service)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-501

Изменение политики безопасности Secret Net Studio

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-502

Многократная смена пароля учетной записи

TA0003 (Persistence), TA0040 (Impact)

T1098 (Account Manipulation), T1531 (Account Access Removal)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-503

Изменение правил межсетевого экрана в Secret Net Studio

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.004 (Impair Defenses: Disable or Modify System Firewall)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-504

Изменение критически важной учетной записи

TA0040 (Impact)

T1098 (Account Manipulation), T1531 (Account Access Removal)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-505

Отключение защитного механизма в Secret Net Studio

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-506

Отключение механизма самозащиты в Secret Net Studio

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

SNS audit events

Код Безопасности

Secret Net Studio

RV-D-507

Подключено съемное устройство к компьютеру

TA0009 (Collection)

T1025 (Data from Removable Media)

SNS audit events

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-520

Изменен пароль для привилегированного режима

TA0003 (Persistence)

T1098 (Account Manipulation)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-521

Создан пользователь на S-Terra Gate

TA0003 (Persistence)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-522

Вход в привилегированный режим на S-Terra Gate

TA0004 (Privilege Escalation), TA0003 (Persistence)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-523

Очищен файл конфигурации на S-Terra Gate

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.007 (Indicator Removal: Clear Network Connection History and Configurations)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-524

Подбор пароля для привилегированного режима

TA0006 (Credential Access)

T1110 (Brute Force)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-525

Настроена отправка логов на неизвестный узел

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.008 (Command and Scripting Interpreter: Network Device CLI)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-526

Выдача максимальных привилегий для пользователя

TA0004 (Privilege Escalation)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts), T1098 (Account Manipulation), T1548 (Abuse Elevation Control Mechanism)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-527

Удален файл на S-Terra Gate

TA0040 (Impact)

T1485 (Data Destruction), T1136.001 (Create Account: Local Account), T1485.001 (Data Destruction: Lifecycle-Triggered Deletion)

-

С-Терра СиЭсПи

С-Терра Шлюз

RV-D-528

Отключена отправка событий на S-Terra Gate

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

-

Солар

Solar webProxy

RV-D-199

Множественные неуспешные попытки аутентификации на системе SWP

TA0006 (Credential Access)

T1110 (Brute Force)

-

Солар

Solar webProxy

RV-D-200

Успешный подбор пароля пользователя на Solar Web Proxy

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

Солар

Solar webProxy

RV-D-201

Изменены параметры внешних подключений на Solar Web Proxy

TA0005 (Defense Evasion)

T1562 (Impair Defenses)

-

Солар

Solar webProxy

RV-D-202

Изменение правил межсетевого экранирования и доступа в Solar Web Proxy

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools), T1562.004 (Impair Defenses: Disable or Modify System Firewall)

-

Солар

Solar webProxy

RV-D-203

Изменены критичные параметры системы Solar Web Proxy

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

-

Солар

Solar webProxy

RV-D-204

Вход под привилегированной учетной записью с неизвестного IP на сервер SWP

TA0004 (Privilege Escalation)

T1078 (Valid Accounts), T1078.002 (Valid Accounts: Domain Accounts), T1078.003 (Valid Accounts: Local Accounts)

-

Солар

Solar webProxy

RV-D-205

Создан новый пользователь в Solar Web Proxy

TA0003 (Persistence)

T1136 (Create Account), T1136.001 (Create Account: Local Account), T1136.002 (Create Account: Domain Account)

-

Солар

Solar webProxy

RV-D-206

Создание или изменение роли с критичными правами на Solar Web Proxy

TA0003 (Persistence)

T1098 (Account Manipulation)

-

Солар

Solar webProxy

RV-D-207

Изменены параметры учетной записи на Solar Web Proxy

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation)

-

Atlassian

Confluence

RV-D-24

Выгрузка множества страниц Confluence

TA0009 (Collection)

T1213 (Data from Information Repositories), T1213.001 (Data from Information Repositories: Confluence)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-25

Выгрузка пространства Confluence

TA0009 (Collection)

T1213 (Data from Information Repositories), T1213.001 (Data from Information Repositories: Confluence)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-26

Множественные попытки входа на веб-сервер Confluence

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-27

Отключение аудита журналов приложения Confluence

TA0005 (Defense Evasion)

T1562 (Impair Defenses)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-28

Эксплуатация уязвимости в Confluence - CVE-2023-22515

TA0004 (Privilege Escalation), TA0001 (Initial Access), TA0002 (Execution)

T1068 (Exploitation for Privilege Escalation), T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-29

Эксплуатация уязвимости в Confluence - CVE-2023-22518

TA0004 (Privilege Escalation), TA0001 (Initial Access), TA0002 (Execution)

T1068 (Exploitation for Privilege Escalation), T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-30

Эксплуатация уязвимости в Confluence - CVE-2023-22527

TA0004 (Privilege Escalation), TA0001 (Initial Access), TA0002 (Execution)

T1068 (Exploitation for Privilege Escalation), T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-31

Выполнение OGNL-инъекции через Java-выражения в Confluence

TA0002 (Execution)

T1203 (Exploitation for Client Execution)

confluence_access.log, access.log

Atlassian

Confluence

RV-D-32

Создание множества страниц Confluence

TA0040 (Impact)

T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation), T1491 (Defacement), T1491.001 (Defacement: Internal Defacement), T1491.002 (Defacement: External Defacement)

confluence_access.log, access.log

Atlassian

Jira

RV-D-70

Создание резервной копии Jira

TA0009 (Collection), TA0040 (Impact)

T1213 (Data from Information Repositories), T1213.001 (Data from Information Repositories: Confluence), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

-

Atlassian

Jira

RV-D-71

Дамп множества задач в Jira

TA0009 (Collection), TA0040 (Impact)

T1213 (Data from Information Repositories), T1213.001 (Data from Information Repositories: Confluence), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

-

Atlassian

Jira

RV-D-72

Экспорт множества задач в Jira

TA0009 (Collection), TA0040 (Impact)

T1213 (Data from Information Repositories), T1213.001 (Data from Information Repositories: Confluence), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

-

Atlassian

Jira

RV-D-73

Множество неудачных попыток входа в Jira

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

Atlassian

Jira

RV-D-74

Изменение конфигурации журналов логирования в Jira

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

-

Atlassian

Jira

RV-D-75

Создание множества задач пользователем в Jira

TA0040 (Impact)

T1499 (Endpoint Denial of Service), T1499.003 (Endpoint Denial of Service: Application Exhaustion Flood), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

-

Atlassian

Jira

RV-D-76

Удаление множества задач пользователем в Jira

TA0040 (Impact)

T1485 (Data Destruction), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

-

Atlassian

Jira

RV-D-77

Создание пользователя в Jira

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account)

-

Atlassian

Jira

RV-D-78

Добавление пользователя в критичные группы

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation), T1098.007 (Account Manipulation: Additional Local or Domain Groups)

-

Atlassian

Jira

RV-D-482

Эксплуатация уязвимости в Jira - CVE-2023-26256

TA0007 (Discovery), TA0001 (Initial Access), TA0005 (Defense Evasion), TA0006 (Credential Access), TA0009 (Collection)

T1083 (File and Directory Discovery), T1190 (Exploit Public-Facing Application), T1211 (Exploitation for Defense Evasion), T1212 (Exploitation for Credential Access), T1213 (Data from Information Repositories), T1213.001 (Data from Information Repositories: Confluence), T1552 (Unsecured Credentials), T1552.008 (Unsecured Credentials: Chat Messages)

-

Cisco

ASA

RV-D-5

Успешный подбор пароля в привилегированный режим Cisco ASA

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Syslog (EventID_308001, EventID_502103)

Cisco

ASA

RV-D-6

Подбор пароля через SSH к Cisco ASA

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing), T1110.003 (Brute Force: Password Spraying)

Syslog (EventID_113015)

Cisco

ASA

RV-D-7

Успешный подбор пароля через SSH к Cisco ASA

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Syslog (EventID_113012, EventID_113015)

Cisco

ASA

RV-D-8

Доступ к привилегированному режиму после авторизации

TA0004 (Privilege Escalation)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

Syslog (EventID_113012, EventID_502103)

Cisco

IOS

RV-D-1

Подбор пароля к устройству на Cisco IOS методом Password Spraying

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

Syslog (Login failed)

Cisco

IOS

RV-D-2

Успешный подбор пароля к устройству c ОС Cisco IOS

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Syslog (Login failed, Login success)

Cisco

IOS

RV-D-3

Подбор пароля к устройству c ОС Cisco IOS

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Syslog (Login failed)

Cisco

IOS

RV-D-4

Вход привилегированного пользователя на устройство c ОС Cisco IOS с неизвестного хоста

TA0006 (Credential Access), TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.001 (Valid Accounts: Default Accounts), T1078.002 (Valid Accounts: Domain Accounts), T1078.003 (Valid Accounts: Local Accounts)

Syslog (Login success)

ClickHouse

ClickHouse

RV-D-9

Использование LIKE для разведки в Clickhouse

TA0009 (Collection)

T1005 (Data from Local System)

-

ClickHouse

ClickHouse

RV-D-10

Подбор пароля к СУБД ClickHouse

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

ClickHouse

ClickHouse

RV-D-11

Изменение конфигурации базы данных ClickHouse

TA0003 (Persistence), TA0005 (Defense Evasion), TA0007 (Discovery), TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1087 (Account Discovery), T1556 (Modify Authentication Process), T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

-

ClickHouse

ClickHouse

RV-D-12

Небезопасный способ аутентификации пользователя ClickHouse

TA0003 (Persistence), TA0004 (Privilege Escalation), TA0006 (Credential Access)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account), T1552 (Unsecured Credentials)

-

ClickHouse

ClickHouse

RV-D-13

Создание дампа таблиц в ClickHouse

TA0006 (Credential Access), TA0009 (Collection)

T1003 (OS Credential Dumping), T1005 (Data from Local System), T1074 (Data Staged), T1074.001 (Data Staged: Local Data Staging)

-

ClickHouse

ClickHouse

RV-D-14

Атака Password Spraying на СУБД ClickHouse

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

ClickHouse

ClickHouse

RV-D-15

Вход привилегированного пользователя в базу данных ClickHouse с неизвестного хоста

TA0006 (Credential Access), TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

-

ClickHouse

ClickHouse

RV-D-16

Успешный подбор пароля к СУБД ClickHouse

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

ClickHouse

ClickHouse

RV-D-17

Изменение или удаление таблицы аудита ClickHouse

TA0005 (Defense Evasion), TA0040 (Impact)

T1070 (Indicator Removal), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

-

ClickHouse

ClickHouse

RV-D-18

Взаимодействие с файловой системой из БД ClickHouse

TA0002 (Execution), TA0007 (Discovery), TA0040 (Impact)

T1059 (Command and Scripting Interpreter), T1059.006 (Command and Scripting Interpreter: Python), T1083 (File and Directory Discovery), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

-

ClickHouse

ClickHouse

RV-D-19

Получение информации о системе в ClickHouse

TA0007 (Discovery)

T1082 (System Information Discovery), T1083 (File and Directory Discovery)

-

ClickHouse

ClickHouse

RV-D-20

Получение информации о структуре Clickhouse

TA0006 (Credential Access), TA0007 (Discovery)

T1003 (OS Credential Dumping), T1069 (Permission Groups Discovery), T1069.001 (Permission Groups Discovery: Local Groups), T1082 (System Information Discovery), T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1087.002 (Account Discovery: Domain Account)

-

ClickHouse

ClickHouse

RV-D-21

Попытка удаления базы данных в ClickHouse

TA0040 (Impact)

T1485 (Data Destruction)

-

ClickHouse

ClickHouse

RV-D-22

Попытка удаления нескольких таблиц в ClickHouse

TA0040 (Impact)

T1485 (Data Destruction)

-

ClickHouse

ClickHouse

RV-D-23

Создание привилегированного пользователя в ClickHouse

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account)

-

Docker

Docker Desktop

RV-D-33

Использование debugs в контейнере

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-34

Вызов процесса netcat в контейнере

TA0002 (Execution), TA0004 (Privilege Escalation)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-35

Вызов процесса из /dev/shm в контейнере

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-36

Вызов интерактивного шелла в контейнере

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-37

Вызов kubectl в контейнере

TA0004 (Privilege Escalation)

T1609 (Container Administration Command), T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-38

Вызов mknod в контейнере

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-39

Вызов mount в контейнере

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-40

Обращение к сокет-файлу Docker из контейнера

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-41

Доступ к release_agent из контейнера

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Docker

Docker Desktop

RV-D-42

Попытка эксплуатации уязвимости runc

TA0004 (Privilege Escalation)

T1611 (Escape to Host)

R-Point

Eltex

vESR

RV-D-43

Подбор пароля к маршрутизатору Eltex vESR методом Password Spraying

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

-

Eltex

vESR

RV-D-44

Успешный подбор пароля к маршрутизатору Eltex vESR

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

-

Eltex

vESR

RV-D-45

Подбор пароля к маршрутизатору Eltex vESR

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

-

Eltex

vESR

RV-D-46

Вход привилегированного пользователя на маршрутизатор Eltex vESR с неизвестного хоста

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

-

FreeIPA

FreeIPA

RV-D-47

Чтение Ticket CCACHE файла

TA0006 (Credential Access)

T1558 (Steal or Forge Kerberos Tickets), T1558.005 (Steal or Forge Kerberos Tickets: Ccache Files)

Auditd

FreeIPA

FreeIPA

RV-D-48

Атака Golden Ticket FreeIPA

TA0006 (Credential Access)

T1558 (Steal or Forge Kerberos Tickets), T1558.001 (Steal or Forge Kerberos Tickets: Golden Ticket)

Auditd

FreeIPA

FreeIPA

RV-D-49

Выполнение бэкапа FreeIPA

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.006 (OS Credential Dumping: DCSync)

Auditd

FreeIPA

FreeIPA

RV-D-50

Успешный подбор пароля пользователя FreeIPA

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

KRB5KDC

FreeIPA

FreeIPA

RV-D-51

Чтение LDAP-секретов FreeIPA

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.006 (OS Credential Dumping: DCSync)

Auditd

FreeIPA

FreeIPA

RV-D-52

Атака Silver Ticket FreeIPA

TA0006 (Credential Access)

T1558 (Steal or Forge Kerberos Tickets), T1558.002 (Steal or Forge Kerberos Tickets: Silver Ticket), T1558.005 (Steal or Forge Kerberos Tickets: Ccache Files)

Auditd

FreeIPA

FreeIPA

RV-D-53

Подбор пароля пользователя FreeIPA

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

KRB5KDC

FreeIPA

FreeIPA

RV-D-54

Использование утилиты kadmin

TA0003 (Persistence)

T1003 (OS Credential Dumping), T1098 (Account Manipulation), T1134 (Access Token Manipulation), T1543 (Create or Modify System Process)

Auditd

FreeIPA

FreeIPA

RV-D-55

Разведка пользователей/ролей IPA

TA0007 (Discovery)

T1087 (Account Discovery), T1087.002 (Account Discovery: Domain Account)

error_log

FreeIPA

FreeIPA

RV-D-56

Изменение оболочки входа средствами FreeIPA

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell)

error_log

FreeIPA

FreeIPA

RV-D-57

Остановка/перезапуск сервисов FreeIPA

TA0040 (Impact)

T1489 (Service Stop)

Auditd

FreeIPA

FreeIPA

RV-D-58

Изменение конфигураций FreeIPA через API

TA0003 (Persistence)

T1556 (Modify Authentication Process), T1556.001 (Modify Authentication Process: Domain Controller Authentication)

error_log

FreeIPA

FreeIPA

RV-D-59

Изменение файлов управления FreeIPA

TA0003 (Persistence)

T1036 (Masquerading), T1574 (Hijack Execution Flow)

Auditd

FreeIPA

FreeIPA

RV-D-60

Изменение конфигураций разрешений в FreeIPA

TA0003 (Persistence)

T1098 (Account Manipulation), T1556 (Modify Authentication Process), T1556.001 (Modify Authentication Process: Domain Controller Authentication)

error_log

FreeIPA

FreeIPA

RV-D-61

Изменение конфигураций привилегий в FreeIPA

TA0003 (Persistence)

T1098 (Account Manipulation), T1556 (Modify Authentication Process), T1556.001 (Modify Authentication Process: Domain Controller Authentication)

error_log

FreeIPA

FreeIPA

RV-D-62

Изменение конфигураций ролей в FreeIPA

TA0003 (Persistence)

T1098 (Account Manipulation)

error_log

FreeIPA

FreeIPA

RV-D-63

Изменение конфигурации сервера FreeIPA

TA0003 (Persistence)

T1003 (OS Credential Dumping), T1136 (Create Account), T1136.002 (Create Account: Domain Account), T1556 (Modify Authentication Process), T1556.001 (Modify Authentication Process: Domain Controller Authentication)

Auditd

FreeIPA

FreeIPA

RV-D-64

Изменение конфигурации сервера kerberos

TA0003 (Persistence)

T1556 (Modify Authentication Process), T1556.001 (Modify Authentication Process: Domain Controller Authentication)

Auditd

FreeIPA

FreeIPA

RV-D-65

Изменение конфигурации сервера ldap

TA0003 (Persistence)

T1556 (Modify Authentication Process), T1556.001 (Modify Authentication Process: Domain Controller Authentication), T1558 (Steal or Forge Kerberos Tickets)

Auditd

FreeIPA

FreeIPA

RV-D-66

Изменение конфигурации sudo в FreeIPA

TA0004 (Privilege Escalation)

T1548 (Abuse Elevation Control Mechanism), T1548.003 (Abuse Elevation Control Mechanism: Sudo and Sudo Caching)

error_log

FreeIPA

FreeIPA

RV-D-67

Добавление HBAC-правила через FreeIPA

TA0004 (Privilege Escalation)

T1098 (Account Manipulation)

error_log

GitHub

GitHub

RV-D-68

Эксплуатация уязвимости в GitHub Enterprise Server - CVE-2024-0507

TA0002 (Execution), TA0004 (Privilege Escalation)

T1068 (Exploitation for Privilege Escalation), T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution)

haproxy.log, access.log

InfoWatch

Traffic Monitor

RV-D-609

Атака Brute Force к InfoWatch TM

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

arc_view_audit_log

InfoWatch

Traffic Monitor

RV-D-610

Отключение политики аудита InfoWatch TM

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

arc_view_audit_log

InfoWatch

Traffic Monitor

RV-D-611

Массовое удаление УЗ InfoWatch TM

TA0040 (Impact)

T1531 (Account Access Removal)

arc_view_audit_log

InfoWatch

Traffic Monitor

RV-D-612

Создание администратора в InfoWatch TM

TA0003 (Persistence)

T1078 (Valid Accounts), T1078.001 (Valid Accounts: Default Accounts), T1078.003 (Valid Accounts: Local Accounts), T1136 (Create Account), T1136.001 (Create Account: Local Account)

arc_view_audit_log

InfoWatch

Traffic Monitor

RV-D-613

Создание роли администратора в InfoWatch TM

TA0003 (Persistence)

T1078 (Valid Accounts), T1078.001 (Valid Accounts: Default Accounts), T1078.003 (Valid Accounts: Local Accounts), T1098 (Account Manipulation)

arc_view_audit_log

InfoWatch

Traffic Monitor

RV-D-614

Успешная атака Brute Force к InfoWatch TM

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

arc_view_audit_log

InfoWatch

Traffic Monitor

RV-D-615

Password Spraying в InfoWatch TM

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

arc_view_audit_log

InfoWatch

Traffic Monitor

RV-D-616

Вход администратора на InfoWatch TM

TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.001 (Valid Accounts: Default Accounts), T1078.002 (Valid Accounts: Domain Accounts), T1078.003 (Valid Accounts: Local Accounts)

arc_view_audit_log

Internet Systems Consortium

BIND

RV-D-636

Множественные DNS-запросы с одного устройства

TA0010 (Exfiltration)

T1048 (Exfiltration Over Alternative Protocol), T1048.003 (Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol), T1071 (Application Layer Protocol), T1071.004 (Application Layer Protocol: DNS)

queries.log

Internet Systems Consortium

BIND

RV-D-638

Обнаружен DNS-запрос к ресурсам Telegram API

TA0011 (Command and Control), TA0010 (Exfiltration)

T1048 (Exfiltration Over Alternative Protocol), T1048.003 (Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol), T1071 (Application Layer Protocol), T1071.004 (Application Layer Protocol: DNS), T1102 (Web Service), T1102.002 (Web Service: Bidirectional Communication)

queries.log

Internet Systems Consortium

BIND

RV-D-639

Обнаружен DNS-запрос к пулам Monero

TA0040 (Impact)

T1496 (Resource Hijacking), T1496.001 (Resource Hijacking: Compute Hijacking)

queries.log

Internet Systems Consortium

BIND

RV-D-640

Обнаружен DNS-запрос к подозрительным внешним службам

TA0001 (Initial Access), TA0043 (Reconnaissance)

T1190 (Exploit Public-Facing Application), T1595 (Active Scanning), T1595.002 (Active Scanning: Vulnerability Scanning)

queries.log

Internet Systems Consortium

BIND

RV-D-643

Передача зоны DNS на недоверенный узел (AXFR)

TA0043 (Reconnaissance)

T1590 (Gather Victim Network Information), T1590.002 (Gather Victim Network Information: DNS)

default.log

Internet Systems Consortium

BIND

RV-D-644

Обнаружен DNS-запрос к Killswitch-домену WannaCry

TA0002 (Execution)

T1204 (User Execution), T1204.002 (User Execution: Malicious File)

queries.log

Internet Systems Consortium

BIND

RV-D-647

Использование DNS-туннеля

TA0010 (Exfiltration), TA0011 (Command and Control)

T1048 (Exfiltration Over Alternative Protocol), T1048.003 (Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol), T1071 (Application Layer Protocol), T1071.004 (Application Layer Protocol: DNS), T1132 (Data Encoding), T1132.001 (Data Encoding: Standard Encoding)

queries.log

Internet Systems Consortium

BIND

RV-D-730

Обнаружен DNS-запрос к домену localtonet

TA0011 (Command and Control)

T1572 (Protocol Tunneling)

queries.log

JetBrains

TeamCity

RV-D-69

Эксплуатация уязвимости в JetBrains TeamCity - CVE-2024-27198

TA0004 (Privilege Escalation), TA0005 (Defense Evasion), TA0003 (Persistence), TA0001 (Initial Access)

T1068 (Exploitation for Privilege Escalation), T1134 (Access Token Manipulation), T1134.003 (Access Token Manipulation: Make and Impersonate Token), T1136 (Create Account), T1136.001 (Create Account: Local Account), T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution), T1212 (Exploitation for Credential Access)

access.log

JetBrains

TeamCity

RV-D-551

Вход привилегированного пользователя в TeamCity с неизвестного хоста

TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

teamcity-auth.log

JetBrains

TeamCity

RV-D-552

Успешный подбор пароля к JetBrains TeamCity

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

teamcity-server.log, teamcity-auth.log

JetBrains

TeamCity

RV-D-553

Подбор пароля к JetBrains TeamCity

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

teamcity-server.log

JetBrains

TeamCity

RV-D-554

Получение авторизационного токена TeamCity

TA0003 (Persistence), TA0006 (Credential Access)

T1528 (Steal Application Access Token)

teamcity-activities.log

JetBrains

TeamCity

RV-D-555

Загрузка плагина TeamCity

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1195 (Supply Chain Compromise), T1195.001 (Supply Chain Compromise: Compromise Software Dependencies and Development Tools), T1195.002 (Supply Chain Compromise: Compromise Software Supply Chain), T1505 (Server Software Component: Web Shell)

teamcity-server.log

JetBrains

TeamCity

RV-D-556

Создание учетной записи TeamCity

TA0003 (Persistence)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account)

teamcity-server.log

JetBrains

TeamCity

RV-D-557

Изменение состава или роли группы

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation), T1098.007 (Account Manipulation: Additional Local or Domain Groups)

teamcity-activities.log

JetBrains

TeamCity

RV-D-558

Включена возможность удаленного выполнения команд

TA0002 (Execution), TA0004 (Privilege Escalation), TA0011 (Command and Control)

T1059 (Command and Scripting Interpreter), T1068 (Exploitation for Privilege Escalation), T1102 (Web Service), T1102.002 (Web Service: Bidirectional Communication), T1190 (Exploit Public-Facing Application)

access.log

JetBrains

TeamCity

RV-D-559

Изменение конфигурации сборки под подозрительной УЗ

TA0008 (Lateral Movement)

T1021 (Remote Services)

teamcity-activities.log

JetBrains

TeamCity

RV-D-658

Эксплуатация CVE-2023-42793 в JetBrains TeamCity

TA0002 (Execution), TA0004 (Privilege Escalation)

T1068 (Exploitation for Privilege Escalation), T1134 (Access Token Manipulation), T1134.003 (Access Token Manipulation: Make and Impersonate Token), T1190 (Exploit Public-Facing Application), T1195 (Supply Chain Compromise), T1195.001 (Supply Chain Compromise: Compromise Software Dependencies and Development Tools), T1210 (Exploitation of Remote Services), T1595 (Active Scanning), T1595.002 (Active Scanning: Vulnerability Scanning)

access.log

Kaspersky

Kaspersky Secure Mail Gateway

RV-D-664

Вредоносное вложение в письме

TA0001 (Initial Access), TA0043 (Reconnaissance)

T1534 (Internal Spearphishing), T1566 (Phishing), T1566.001 (Phishing: Spearphishing Attachment), T1566.002 (Phishing: Spearphishing Link), T1598 (Phishing for Information), T1598.002 (Phishing for Information: Spearphishing Attachment)

Kaspersky Secure Mail Gateway (LMS_EV_SCAN_LOGIC_PART_RESULT, LMS_EV_SCAN_LOGIC_AV_STATUS)

Kaspersky

Kaspersky Secure Mail Gateway

RV-D-665

Вредоносная ссылка в письме

TA0001 (Initial Access)

T1189 (Drive-by Compromise), T1204 (User Execution), T1204.001 (User Execution: Malicious Link), T1566 (Phishing), T1566.002 (Phishing: Spearphishing Link), T1598 (Phishing for Information), T1598.003 (Phishing for Information: Spearphishing Link)

Kaspersky Secure Mail Gateway (LMS_EV_SCAN_LOGIC_URL)

Kaspersky

Kaspersky Secure Mail Gateway

RV-D-666

Проверка подлинности отправителя сообщений

TA0001 (Initial Access)

T1534 (Internal Spearphishing), T1566 (Phishing), T1598 (Phishing for Information)

Kaspersky Secure Mail Gateway (LMS_EV_SCAN_LOGIC_PART_RESULT)

Kaspersky

Kaspersky Secure Mail Gateway

RV-D-667

Получение массовой рассылки писем

TA0001 (Initial Access)

T1566 (Phishing), T1598 (Phishing for Information), T1667 (Email Bombing)

Kaspersky Secure Mail Gateway (LMS_EV_SCAN_LOGIC_AS_STATUS)

Kaspersky

Kaspersky Secure Mail Gateway

RV-D-668

Получение спам-письма

TA0001 (Initial Access)

T1566 (Phishing), T1598 (Phishing for Information)

Kaspersky Secure Mail Gateway (LMS_EV_SCAN_LOGIC_AS_STATUS)

Kaspersky

Kaspersky Secure Mail Gateway

RV-D-669

Шифрованное вложение в письме

TA0001 (Initial Access)

T1027 (Obfuscated Files or Information), T1534 (Internal Spearphishing), T1566 (Phishing), T1566.001 (Phishing: Spearphishing Attachment), T1598 (Phishing for Information), T1598.002 (Phishing for Information: Spearphishing Attachment)

Kaspersky Secure Mail Gateway (LMS_EV_SCAN_LOGIC_PART_RESULT, LMS_EV_SCAN_LOGIC_AV_STATUS)

Kaspersky

Kaspersky Security Center

RV-DD-1

Успешное исполнение задачи на удаленную установку программы средствами KSC через установочные пакеты

TA0002 (Execution), TA0008 (Lateral Movement)

T1072 (Software Deployment Tools), T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLPRCI_TaskState, KLNAG_EV_INV_APP_INSTALLED, KLAUD_EV_OBJECTMODIFY)

Kaspersky

Kaspersky Security Center

RV-D-83

Критичная политика была изменена Kaspersky

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLAUD_EV_OBJECTMODIFY)

Kaspersky

Kaspersky Security Center

RV-D-84

Повторное заражение хоста одним вирусом

TA0008 (Lateral Movement), TA0002 (Execution)

T1080 (Taint Shared Content), T1204 (User Execution), T1204.002 (User Execution: Malicious File), T1204.003 (User Execution: Malicious Image), T1210 (Exploitation of Remote Services)

Kaspersky Security Center (GNRL_EV_VIRUS_FOUND)

Kaspersky

Kaspersky Security Center

RV-D-85

Устройство перемещено в группу администрирования на сервере KSC

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLAUD_EV_ADMGROUP_CHANGED)

Kaspersky

Kaspersky Security Center

RV-D-86

Зафиксировано отключение задачи средств AV-защиты Kaspersky

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (EventID_000000de)

Kaspersky

Kaspersky Security Center

RV-D-87

На сервере KSC созданы пакет установки и удаленная задача на установку пакета

TA0002 (Execution), TA0008 (Lateral Movement)

T1072 (Software Deployment Tools), T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLAUD_EV_OBJECTMODIFY)

Kaspersky

Kaspersky Security Center

RV-D-89

Изменение политик администрирования на сервере KSC

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLAUD_EV_OBJECTMODIFY)

Kaspersky

Kaspersky Security Center

RV-D-90

Отключение продукта Kaspersky в результате выполнения задачи

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLPRCI_TaskState)

Kaspersky

Kaspersky Security Center

RV-D-91

Отключение компонентов защиты продуктов Kaspersky

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (EventID_000000d6)

Kaspersky

Kaspersky Security Center

RV-D-92

Создание и исполнение задачи на удаленную деинсталляцию программы средствами KSC

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLAUD_EV_OBJECTMODIFY, KLAUD_EV_TASK_STATE_CHANGED)

Kaspersky

Kaspersky Security Center

RV-D-93

Успешное исполнение задачи на удаленную установку программы средствами KSC

TA0005 (Defense Evasion), TA0002 (Execution), TA0008 (Lateral Movement)

T1072 (Software Deployment Tools), T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLPRCI_TaskState, KLNAG_EV_INV_APP_INSTALLED)

Kaspersky

Kaspersky Security Center

RV-D-94

Зафиксирован переход по опасной ссылке

TA0002 (Execution), TA0043 (Reconnaissance)

T1204 (User Execution), T1204.001 (User Execution: Malicious Link), T1598 (Phishing for Information), T1598.003 (Phishing for Information: Spearphishing Link), T1608 (Stage Capabilities), T1608.005 (Stage Capabilities: Link Target)

Kaspersky Security Center (GNRL_EV_VIRUS_FOUND_AND_REPORTED, GNRL_EV_VIRUS_FOUND_AND_BLOCKED)

Kaspersky

Kaspersky Security Center

RV-D-95

Множество хостов заражены одним типом ВПО

TA0042 (Resource Development)

T1608 (Stage Capabilities), T1608.001 (Stage Capabilities: Upload Malware)

Kaspersky Security Center (GNRL_EV_VIRUS_FOUND, GNRL_EV_VIRUS_FOUND_BY_KSN)

Kaspersky

Kaspersky Security Center

RV-D-96

Множественное срабатывание вердиктов средств AV-защиты на одном хосте

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (GNRL_EV_VIRUS_FOUND, GNRL_EV_VIRUS_FOUND_BY_KSN)

Kaspersky

Kaspersky Security Center

RV-D-97

Зафиксирована сетевая атака

TA0043 (Reconnaissance)

T1595 (Active Scanning), T1595.001 (Active Scanning: Scanning IP Blocks)

Kaspersky Security Center (GNRL_EV_ATTACK_DETECTED)

Kaspersky

Kaspersky Security Center

RV-D-98

Зафиксированы устаревшие базы антивирусного ПО Kaspersky

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (EventID_000000cf, EventID_000000d0)

Kaspersky

Kaspersky Security Center

RV-D-99

Включение учетной записи пользователя на сервере KSC

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation)

Kaspersky Security Center (KLAUD_EV_OBJECTPROPMODIFIED)

Kaspersky

Kaspersky Security Center

RV-D-100

Было удалено обнаруженное средствами AV-защиты ВПО

TA0042 (Resource Development)

T1608 (Stage Capabilities), T1608.001 (Stage Capabilities: Upload Malware)

Kaspersky Security Center (GNRL_EV_VIRUS_FOUND, GNRL_EV_VIRUS_FOUND_BY_KSN, GNRL_EV_OBJECT_DELETED, GNRL_EV_OBJECT_CURED, GNRL_EV_OBJECT_BLOCKED)

Kaspersky

Kaspersky Security Center

RV-D-101

Не было удалено обнаруженное средствами AV-защиты ВПО

TA0042 (Resource Development)

T1608 (Stage Capabilities), T1608.001 (Stage Capabilities: Upload Malware)

Kaspersky Security Center (GNRL_EV_VIRUS_FOUND_BY_KSN, GNRL_EV_VIRUS_FOUND, GNRL_EV_OBJECT_NOTCURED, GNRL_EV_OBJECT_REPORTED, EventID_00000139, EventID_000009fc)

Kaspersky

Kaspersky Security Center

RV-D-688

Подключение недоверенного устройства

TA0001 (Initial Access), TA0008 (Lateral Movement), TA0011 (Command and Control)

T1091 (Replication Through Removable Media), T1219 (Remote Access Tools), T1219.003 (Remote Access Tools: Remote Access Hardware)

Kaspersky Endpoint Security (GNRL_EV_DEVCTRL_DEV_PLUG_DENIED)

Kaspersky

Kaspersky Security Center

RV-D-766

Устройство давно не подключалось к серверу KSC

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.001 (Impair Defenses: Disable or Modify Tools)

Kaspersky Security Center (KLSRV_HOST_STATUS_CRITICAL)

Kubernetes

Kubernetes

RV-D-102

Изменение файлов helm

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1543 (Create or Modify System Process), T1543.005 (Create or Modify System Process: Container Service)

Auditd

Kubernetes

Kubernetes

RV-D-103

Привязка стандартных административных ролей k8s

TA0003 (Persistence)

T1098 (Account Manipulation), T1098.006 (Account Manipulation: Additional Container Cluster Roles)

audit.log

Kubernetes

Kubernetes

RV-D-104

Добавление кластерных ролей k8s

TA0003 (Persistence)

T1098 (Account Manipulation), T1098.006 (Account Manipulation: Additional Container Cluster Roles)

audit.log

Kubernetes

Kubernetes

RV-D-105

Удаление роли k8s

TA0003 (Persistence)

T1098 (Account Manipulation), T1098.006 (Account Manipulation: Additional Container Cluster Roles)

audit.log

Kubernetes

Kubernetes

RV-D-106

Добавление ролей k8s

TA0003 (Persistence)

T1098 (Account Manipulation), T1098.006 (Account Manipulation: Additional Container Cluster Roles)

audit.log

Kubernetes

Kubernetes

RV-D-510

Анонимный доступ к секретам k8s

TA0006 (Credential Access)

T1552 (Unsecured Credentials), T1552.007 (Unsecured Credentials: Container API)

audit.log

Kubernetes

Kubernetes

RV-D-576

Изменение стандартов безопасности pod

TA0005 (Defense Evasion)

T1562 (Impair Defenses)

audit.log

Kubernetes

Kubernetes

RV-D-577

Создание static pods

TA0003 (Persistence)

T1543 (Create or Modify System Process), T1543.005 (Create or Modify System Process: Container Service)

audit.log

Kubernetes

Kubernetes

RV-D-637

Создание сервисного аккаунта k8s

TA0003 (Persistence)

T1136 (Create Account), T1136.001 (Create Account: Local Account)

audit.log

Kubernetes

Kubernetes

RV-D-641

Неуспешный запрос от сервисного аккаунта k8s

TA0007 (Discovery)

T1613 (Container and Resource Discovery)

audit.log

Kubernetes

Kubernetes

RV-D-642

Создание или изменение службы NodePort

TA0003 (Persistence)

T1133 (External Remote Services)

audit.log

Kubernetes

Kubernetes

RV-D-645

Поиск разрешений сервисным аккаунтом k8s

TA0007 (Discovery)

T1069 (Permission Groups Discovery)

audit.log

Kubernetes

Kubernetes

RV-D-646

Поиск секретов k8s

TA0007 (Discovery)

T1613 (Container and Resource Discovery)

audit.log

Kubernetes

Kubernetes

RV-D-649

Запуск интерактивной оболочки в контейнере

TA0002 (Execution)

T1552 (Unsecured Credentials), T1552.007 (Unsecured Credentials: Container API), T1609 (Container Administration Command)

audit.log

Kubernetes

Kubernetes

RV-D-751

Создание привилегированного пода k8s

TA0004 (Privilege Escalation)

T1610 (Deploy Container), T1611 (Escape to Host)

audit.log

Kubernetes

Kubernetes

RV-D-752

Создание контейнера с Linux Capabilities

TA0004 (Privilege Escalation)

T1610 (Deploy Container), T1611 (Escape to Host)

audit.log

Kubernetes

Kubernetes

RV-D-757

Назначение сервисного аккаунта контейнеру в kube-system

TA0004 (Privilege Escalation)

T1078 (Valid Accounts), T1078.001 (Valid Accounts: Default Accounts), T1098 (Account Manipulation)

audit.log

Linux

RV-D-107

Использование утилит для создания снимков экрана Linux

TA0009 (Collection)

T1113 (Screen Capture)

Auditd

Linux

RV-D-108

Загрузка файлов с удаленных ресурсов при помощи стандартных утилит

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Auditd

Linux

RV-D-109

Туннелирование с использованием ngrok в Linux

TA0011 (Command and Control)

T1090 (Proxy), T1090.002 (Proxy: External Proxy)

Auditd

Linux

RV-D-110

Загрузка файлов утилитой wget в директорию tmp

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

R-Point

Linux

RV-D-111

Чтение файлов с историей команд

TA0006 (Credential Access)

T1552 (Unsecured Credentials), T1552.003 (Unsecured Credentials: Bash History)

Auditd

Linux

RV-D-112

Чтение файлов с пользовательскими учетными данными

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.008 (OS Credential Dumping: /etc/passwd and /etc/shadow), T1552 (Unsecured Credentials), T1552.001 (Unsecured Credentials: Credentials In Files)

Auditd

Linux

RV-D-114

Подбор пароля на хосте Linux

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Auditd, auth.log, secure

Linux

RV-D-115

Успешный подбор пароля на хосте Linux

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing), T1110.003 (Brute Force: Password Spraying)

Auditd, auth.log, secure

Linux

RV-D-116

Дамп памяти утилитой MimiPenguin на Linux

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.007 (OS Credential Dumping: Proc Filesystem), T1003.008 (OS Credential Dumping: /etc/passwd and /etc/shadow)

Auditd

Linux

RV-D-117

Вызов команды из модуля PAM

TA0006 (Credential Access), TA0005 (Defense Evasion), TA0003 (Persistence)

T1556 (Modify Authentication Process), T1556.003 (Modify Authentication Process: Pluggable Authentication Modules)

R-Point

Linux

RV-D-118

Чтение файлов с закрытыми ключами SSH

TA0006 (Credential Access)

T1552 (Unsecured Credentials), T1552.004 (Unsecured Credentials: Private Keys)

Auditd

Linux

RV-D-119

Чтение памяти процессов на Linux

TA0006 (Credential Access), TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1003 (OS Credential Dumping), T1003.007 (OS Credential Dumping: Proc Filesystem), T1055 (Process Injection), T1055.009 (Process Injection: Proc Memory)

Auditd

Linux

RV-D-120

Доступ к критичным файлам SSSD

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.005 (OS Credential Dumping: Cached Domain Credentials), T1078 (Valid Accounts), T1078.002 (Valid Accounts: Domain Accounts), T1558 (Steal or Forge Kerberos Tickets)

Auditd

Linux

RV-D-121

Подбор пароля пользователя Linux

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Auditd, auth.log, secure

Linux

RV-D-122

Успешный подбор пароля пользователя Linux

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Auditd, auth.log, secure

Linux

RV-D-123

Удаление файлов логирования в Linux

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.002 (Indicator Removal: Clear Linux or Mac System Logs), T1070.003 (Indicator Removal: Clear Command History)

Auditd

Linux

RV-D-124

Загрузка подозрительного ebpf модуля

TA0005 (Defense Evasion)

T1014 (Rootkit)

Auditd

Linux

RV-D-125

Изменение конфигурационных файлов службы firewalld

TA0005 (Defense Evasion)

T1562 (Impair Defenses), T1562.004 (Impair Defenses: Disable or Modify System Firewall)

Auditd

Linux

RV-D-126

Изменение критичных файлов конфигурации интерактивной оболочки

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.003 (Indicator Removal: Clear Command History), T1546 (Event Triggered Execution), T1546.004 (Event Triggered Execution: Unix Shell Configuration Modification), T1562.003 (Impair Defenses: Impair Command History Logging)

Auditd

Linux

RV-D-127

Изменение конфигурационных файлов служб журналирования

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.002 (Indicator Removal: Clear Linux or Mac System Logs), T1070.007 (Indicator Removal: Clear Network Connection History and Configurations), T1562 (Impair Defenses), T1562.006 (Impair Defenses: Indicator Blocking), T1562.012 (Impair Defenses: Disable or Modify Linux Audit System)

Auditd

Linux

RV-D-128

Копирование стандартных исполняемых файлов (маскарадинг утилит)

TA0005 (Defense Evasion)

T1036 (Masquerading), T1036.003 (Masquerading: Rename Legitimate Utilities)

Auditd

Linux

RV-D-129

Отключение или модификация Syslog Linux

TA0005 (Defense Evasion)

T1562.006 (Impair Defenses: Indicator Blocking)

Auditd

Linux

RV-D-130

Отключение службы firewalld

TA0005 (Defense Evasion)

T1562.004 (Impair Defenses: Disable or Modify System Firewall)

Auditd

Linux

RV-D-131

Отключение или изменение службы SELinux

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Auditd

Linux

RV-D-132

Изменение привилегий файлов Linux

TA0005 (Defense Evasion)

T1222 (File and Directory Permissions Modification), T1222.002 (File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification)

Auditd

Linux

RV-D-133

Создание/изменение скрытых файлов Linux

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.001 (Hide Artifacts: Hidden Files and Directories)

Auditd

Linux

RV-D-134

Создание/изменение скрытых shared object файлов

TA0005 (Defense Evasion)

T1129 (Shared Modules), T1564 (Hide Artifacts), T1564.001 (Hide Artifacts: Hidden Files and Directories)

Auditd

Linux

RV-D-135

Загрузка кода в процесс Linux

TA0005 (Defense Evasion)

T1620 (Reflective Code Loading)

Auditd

Linux

RV-D-136

Изменение корневых сертификатов Linux

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.004 (Subvert Trust Controls: Install Root Certificate)

Auditd

Linux

RV-D-137

Изменение tmp файлов логирования Linux

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.002 (Indicator Removal: Clear Linux or Mac System Logs)

Auditd

Linux

RV-D-138

Большое количество подозрительных команд

TA0007 (Discovery)

T1016 (System Network Configuration Discovery), T1057 (Process Discovery), T1082 (System Information Discovery), T1518 (Software Discovery)

Auditd

Linux

RV-D-139

Получение информации о текущем пользователе

TA0007 (Discovery)

T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account)

Auditd

Linux

RV-D-140

Разведка доменных УЗ в Linux

TA0007 (Discovery)

T1087 (Account Discovery), T1087.002 (Account Discovery: Domain Account)

Auditd

Linux

RV-D-141

Разведка локальных УЗ в Linux

TA0007 (Discovery)

T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account)

Auditd

Linux

RV-D-142

Разведка установленного ПО в Linux

TA0007 (Discovery)

T1518 (Software Discovery), T1518.001 (Software Discovery: Security Software Discovery), T1592 (Gather Victim Host Information), T1592.002 (Gather Victim Host Information: Software)

Auditd

Linux

RV-D-143

Поиск локализации системы Linux

TA0007 (Discovery)

T1614 (System Location Discovery), T1614.001 (System Location Discovery: System Language Discovery)

Auditd

Linux

RV-D-144

Поиск сетевых конфигураций

TA0007 (Discovery)

T1016 (System Network Configuration Discovery), T1016.001 (System Network Configuration Discovery: Internet Connection Discovery), T1590 (Gather Victim Network Information)

Auditd

Linux

RV-D-145

Разведка парольной политики в Linux

TA0007 (Discovery)

T1201 (Password Policy Discovery)

Auditd

Linux

RV-D-146

Разведка запущенных процессов в Linux

TA0007 (Discovery)

T1057 (Process Discovery)

Auditd

Linux

RV-D-147

Поиск окружения контейнера через proc VFS

TA0007 (Discovery)

T1082 (System Information Discovery)

R-Point

Linux

RV-D-148

Попытка обнаружения контейнеров через Inodes Listing

TA0007 (Discovery)

T1082 (System Information Discovery)

R-Point

Linux

RV-D-149

Использование сетевых утилит Linux для сканирования сети

TA0007 (Discovery), TA0043 (Reconnaissance)

T1046 (Network Service Discovery), T1595 (Active Scanning), T1595.001 (Active Scanning: Scanning IP Blocks)

Auditd

Linux

RV-D-150

Разведка Docker контейнеров через Dockerenv

TA0007 (Discovery)

T1082 (System Information Discovery)

R-Point

Linux

RV-D-151

Поиск файлов с suid/sgid битом

TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1548 (Abuse Elevation Control Mechanism), T1548.001 (Abuse Elevation Control Mechanism: Setuid and Setgid)

Auditd

Linux

RV-D-152

Подозрительное чтение домашней директории пользователя

TA0007 (Discovery)

T1083 (File and Directory Discovery)

Auditd

Linux

RV-D-153

Разведка системной информации Linux

TA0043 (Reconnaissance)

T1082 (System Information Discovery), T1592 (Gather Victim Host Information), T1592.004 (Gather Victim Host Information: Client Configurations)

Auditd

Linux

RV-D-154

Получена информация о системных службах на узле

TA0007 (Discovery)

T1007 (System Service Discovery)

Auditd

Linux

RV-D-155

Эксплуатация уязвимости CVE-2023-46944 в расширении GitLens для VSCode на Linux

TA0002 (Execution)

T1203 (Exploitation for Client Execution)

Auditd

Linux

RV-D-156

Создание интерактивной оболочки через GTFOBins

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.011 (Command and Scripting Interpreter: Lua), T1218 (System Binary Proxy Execution)

Auditd

Linux

RV-D-157

Сетевое обращение от подозрительного скрипта в Linux

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1204 (User Execution), T1204.002 (User Execution: Malicious File)

Auditd

Linux

RV-D-158

Создание подозрительного Named Pipe с помощью Mkfifo

TA0002 (Execution)

T1559 (Inter-Process Communication)

R-Point

Linux

RV-D-159

Reverse-shell через Bash-сценарий

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell)

Auditd

Linux

RV-D-160

Создан Reverse-shell сторонней утилитой в Linux

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.006 (Command and Scripting Interpreter: Python)

Auditd

Linux

RV-D-161

Использование хакерской утилиты в Linux

TA0042 (Resource Development)

T1587 (Develop Capabilities)

Auditd

Linux

RV-D-162

Остановка критичных сервисов в Linux

TA0040 (Impact)

T1489 (Service Stop)

Auditd

Linux

RV-D-163

Загрузка файла с помощью утилит GTFOBins

TA0008 (Lateral Movement)

T1570 (Lateral Tool Transfer)

Auditd

Linux

RV-D-164

Создание туннелей и перенаправление трафика

TA0008 (Lateral Movement), TA0011 (Command and Control)

T1021 (Remote Services), T1021.004 (Remote Services: SSH), T1572 (Protocol Tunneling)

Auditd

Linux

RV-D-165

Загрузка файла сервисной учетной записью

TA0008 (Lateral Movement)

T1570 (Lateral Tool Transfer)

Auditd

Linux

RV-D-166

Разведка под сервисным пользователем

TA0007 (Discovery)

T1016 (System Network Configuration Discovery), T1046 (Network Service Discovery), T1082 (System Information Discovery), T1087 (Account Discovery), T1570 (Lateral Tool Transfer)

Auditd

Linux

RV-D-167

Изменение настроек пользователя

TA0003 (Persistence), TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1548 (Abuse Elevation Control Mechanism), T1548.003 (Abuse Elevation Control Mechanism: Sudo and Sudo Caching), T1098 (Account Manipulation), T1098.007 (Account Manipulation: Additional Local or Domain Groups)

R-Point

Linux

RV-D-168

Создание и удаление уз в короткий период времени

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account)

Auditd, auth.log, secure

Linux

RV-D-169

Изменение критичных файлов Linux

TA0006 (Credential Access), TA0005 (Defense Evasion), TA0003 (Persistence)

T1037 (Boot or Logon Initialization Scripts), T1037.004 (Boot or Logon Initialization Scripts: RC Scripts), T1070 (Indicator Removal), T1070.002 (Indicator Removal: Clear Linux or Mac System Logs), T1098 (Account Manipulation), T1098.004 (Account Manipulation: SSH Authorized Keys), T1546 (Event Triggered Execution), T1546.004 (Event Triggered Execution: Unix Shell Configuration Modification), T1556 (Modify Authentication Process), T1556.003 (Modify Authentication Process: Pluggable Authentication Modules), T1562.012 (Impair Defenses: Disable or Modify Linux Audit System), T1574 (Hijack Execution Flow), T1574.006 (Hijack Execution Flow: Dynamic Linker Hijacking)

Auditd

Linux

RV-D-170

Изменение задач cron

TA0003 (Persistence)

T1053 (Scheduled Task/Job), T1053.003 (Scheduled Task/Job: Cron)

Auditd

Linux

RV-D-171

Закрепление при помощи утилиты Trap

TA0004 (Privilege Escalation), TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.005 (Event Triggered Execution: Trap)

Auditd

Linux

RV-D-172

Добавление/удаление модулей ядра Linux

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1014 (Rootkit), T1547 (Boot or Logon Autostart Execution), T1547.006 (Boot or Logon Autostart Execution: Kernel Modules and Extensions)

Auditd

Linux

RV-D-173

Изменение библиотеки liblzma

TA0003 (Persistence)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1554 (Compromise Host Software Binary), T1556 (Modify Authentication Process)

Auditd

Linux

RV-D-175

Модификация правил udev

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1546 (Event Triggered Execution), T1546.017 (Event Triggered Execution: Udev Rules)

Auditd

Linux

RV-D-176

Создание пользователя или группы

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account)

auth.log, Auditd, secure

Linux

RV-D-177

Закрепление в системе с использованием записей автозагрузки XDG

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1547 (Boot or Logon Autostart Execution), T1547.013 (Boot or Logon Autostart Execution: XDG Autostart Entries)

Auditd

Linux

RV-D-178

Создание/изменение правила nf_tables

TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1068 (Exploitation for Privilege Escalation), T1562.004 (Impair Defenses: Disable or Modify System Firewall)

Auditd

Linux

RV-D-179

Повышение привилегий при помощи pkexec

TA0004 (Privilege Escalation)

T1068 (Exploitation for Privilege Escalation)

Auditd

Linux

RV-D-180

Внедрение процесса в другой через ptrace

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1055 (Process Injection), T1055.008 (Process Injection: Ptrace System Calls)

Auditd

Linux

RV-D-181

Повышение привилегий до root

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1068 (Exploitation for Privilege Escalation), T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts), T1098 (Account Manipulation)

R-Point

Linux

RV-D-480

Использование утилиты SSHuttle для создания SSH-туннеля

TA0011 (Command and Control)

T1572 (Protocol Tunneling)

Auditd

Linux

RV-D-481

Создание файла через Python/Ruby сценарий

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.006 (Command and Scripting Interpreter: Python)

Auditd

Linux

RV-D-483

Злоупотребление сырыми сокетами

TA0011 (Command and Control)

T1095 (Non-Application Layer Protocol)

Auditd

Linux

RV-D-484

Изменение файлов в домашнем каталоге другим пользователем

TA0003 (Persistence)

T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

Auditd

Linux

RV-D-485

Подозрительное изменение директории /etc

TA0003 (Persistence)

T1053 (Scheduled Task/Job), T1053.003 (Scheduled Task/Job: Cron), T1546 (Event Triggered Execution), T1546.004 (Event Triggered Execution: Unix Shell Configuration Modification)

Auditd

Linux

RV-D-486

Загрузка webshell оболочки Linux

TA0003 (Persistence)

T1505 (Server Software Component), T1505.003 (Server Software Component: Web Shell)

Auditd

Linux

RV-D-487

Повышение привилегий с помощью GTFOBins

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.011 (Command and Scripting Interpreter: Lua), T1548 (Abuse Elevation Control Mechanism), T1548.001 (Abuse Elevation Control Mechanism: Setuid and Setgid), T1548.003 (Abuse Elevation Control Mechanism: Sudo and Sudo Caching)

Auditd

Linux

RV-D-488

Использование утилиты fusermount

TA0004 (Privilege Escalation)

T1068 (Exploitation for Privilege Escalation)

Auditd

Linux

RV-D-489

Поиск данных в сетевых папках Linux

TA0009 (Collection)

T1039 (Data from Network Shared Drive)

Auditd

Linux

RV-D-492

Размещение архивов в сетевой папке Linux

TA0009 (Collection)

T1074 (Data Staged)

Auditd

Linux

RV-D-509

Уничтожение информации на диске в Linux

TA0040 (Impact)

T1561 (Disk Wipe), T1561.001 (Disk Wipe: Disk Content Wipe), T1561.002 (Disk Wipe: Disk Structure Wipe)

Auditd

Linux

RV-D-511

Обнаружена команда reverse/bind шелла

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.006 (Command and Scripting Interpreter: Python)

Auditd

Linux

RV-D-516

Модификация файлов MOTD в Linux

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.004 (Event Triggered Execution: Unix Shell Configuration Modification)

Auditd

Linux

RV-D-517

Модификация разрешений системных файлов в Linux

TA0003 (Persistence)

T1222 (File and Directory Permissions Modification), T1222.002 (File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification), T1548 (Abuse Elevation Control Mechanism), T1548.001 (Abuse Elevation Control Mechanism: Setuid and Setgid)

Auditd

Linux

RV-D-518

Запуск утилиты msldapdump для разведки

TA0007 (Discovery)

T1018 (Remote System Discovery), T1046 (Network Service Discovery), T1069 (Permission Groups Discovery), T1069.002 (Permission Groups Discovery: Domain Groups), T1087 (Account Discovery), T1087.002 (Account Discovery: Domain Account), T1201 (Password Policy Discovery), T1615 (Group Policy Discovery)

Auditd

Linux

RV-D-536

Обнаружение стеганографии в Linux

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information), T1027.003 (Obfuscated Files or Information: Steganography)

Auditd

Linux

RV-D-538

Извлечение содержимого буфера в Linux

TA0009 (Collection)

T1115 (Clipboard Data)

Auditd

Linux

RV-D-546

Изменение timers на хосте Linux

TA0002 (Execution)

T1053 (Scheduled Task/Job), T1053.006 (Scheduled Task/Job: Systemd Timers)

Auditd

Linux

RV-D-547

Чтение критичных файлов Linux

TA0009 (Collection)

T1005 (Data from Local System), T1552 (Unsecured Credentials), T1552.001 (Unsecured Credentials: Credentials In Files)

Auditd

Linux

RV-D-548

Использование утилиты at

TA0003 (Persistence)

T1053 (Scheduled Task/Job), T1053.002 (Scheduled Task/Job: At)

Auditd

Linux

RV-D-549

Изменение системных библиотек Linux

TA0003 (Persistence)

T1554 (Compromise Host Software Binary)

Auditd

Linux

RV-D-550

Изменение настроек для скрытия пользователей

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.002 (Hide Artifacts: Hidden Users)

Auditd

Linux

RV-D-572

Обнаружение компиляции исходного кода на Linux

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information), T1027.004 (Obfuscated Files or Information: Compile After Delivery)

Auditd

Linux

RV-D-578

Запуск процесса с помощью ld.so

TA0003 (Persistence)

T1574 (Hijack Execution Flow), T1574.006 (Hijack Execution Flow: Dynamic Linker Hijacking)

Auditd

Linux

RV-D-579

Изменение бинарных файлов Linux

TA0003 (Persistence)

T1554 (Compromise Host Software Binary)

Auditd

Linux

RV-D-630

Атака regreSSHion

TA0001 (Initial Access)

T1190 (Exploit Public-Facing Application)

secure, auth

Linux

RV-D-657

Отключение мандатного контроля целостности

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Auditd

Linux

RV-D-685

Добавление файла в расширения браузера Linux

TA0003 (Persistence)

T1176 (Software Extensions), T1176.001 (Software Extensions: Browser Extensions)

Auditd

Linux

RV-D-686

Добавление расширения в браузер через CLI Linux

TA0003 (Persistence)

T1176 (Software Extensions), T1176.001 (Software Extensions: Browser Extensions)

Auditd

Linux

RV-D-762

Аномальное bind-монтирование

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.013 (Hide Artifacts: Bind Mounts)

Auditd

Linux

RV-D-763

Злоупотребление расширенными атрибутами

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.014 (Hide Artifacts: Extended Attributes)

Auditd

Linux

RV-D-768

Использование chisel для туннелирования трафика

TA0011 (Command and Control)

T1572 (Protocol Tunneling)

Auditd

Microsoft

MSSQL

RV-D-632

Атака Password Spraying на MS SQL Server

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

Application

Microsoft

MSSQL

RV-D-633

Подбор пароля к MS SQL Server

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Application

Microsoft

MSSQL

RV-D-634

Успешный подбор пароля MS SQL Server

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Application

Microsoft

MSSQL

RV-D-635

Вход привилегированного пользователя в MS SQL Server

TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

Application

Microsoft

MSSQL

RV-D-650

Изменение аудита базы данных MS SQL Server

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-651

Получение информации об аудите MS SQL Server

TA0007 (Discovery)

T1518 (Software Discovery), T1518.001 (Software Discovery: Security Software Discovery)

Application

Microsoft

MSSQL

RV-D-652

Создание резервной копии БД MS SQL Server

TA0006 (Credential Access), TA0009 (Collection)

T1003 (OS Credential Dumping), T1005 (Data from Local System), T1074 (Data Staged), T1074.001 (Data Staged: Local Data Staging)

dm_exec_cached_plans, PowerShell

Microsoft

MSSQL

RV-D-653

Удаление нескольких таблиц в MS SQL Server

TA0040 (Impact)

T1485 (Data Destruction)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-654

Удаление базы данных в MS SQL Server

TA0040 (Impact)

T1485 (Data Destruction)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-655

Назначена роль администратора пользователю MS SQL Server

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-656

Изменение пароля привилегированной УЗ MS SQL Server

TA0003 (Persistence)

T1098 (Account Manipulation)

Security, dm_exec_cached_plans

Microsoft

MSSQL

RV-D-683

Получение хеша пароля пользователей MSSQL

TA0006 (Credential Access)

T1003 (OS Credential Dumping)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-684

Получение информации о привилегиях пользователя MSSQL

TA0007 (Discovery)

T1087 (Account Discovery)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-689

Получение информации о версии MSSQL

TA0007 (Discovery)

T1082 (System Information Discovery)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-690

Получение информации о пользователях MSSQL

TA0007 (Discovery)

T1087 (Account Discovery)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-691

Поиск пользователей с административными правами в MSSQL

TA0007 (Discovery)

T1087 (Account Discovery)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-692

Доступ к локальной файловой системе MSSQL

TA0007 (Discovery)

T1083 (File and Directory Discovery), T1565 (Data Manipulation)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-693

Получение информации о пользователях ОС

TA0007 (Discovery)

T1087 (Account Discovery)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-694

Получение информации об алгоритме шифрования БД

TA0007 (Discovery)

T1082 (System Information Discovery), T1518 (Software Discovery), T1518.001 (Software Discovery: Security Software Discovery)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-695

Попытка включить смешанную аутентификацию MS SQL

TA0005 (Defense Evasion)

T1112 (Modify Registry), T1556 (Modify Authentication Process)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-697

Установка небезопасного свойства MS SQL

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1600 (Weaken Encryption)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-698

Отключение политики входа пользователей MS SQL

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation), T1562.001 (Impair Defenses: Disable or Modify Tools)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-699

Включение небезопасных параметров в конфигурации MSSQL

TA0003 (Persistence), TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1543 (Create or Modify System Process), T1543.003 (Create or Modify System Process: Windows Service), T1562.001 (Impair Defenses: Disable or Modify Tools)

Application

Microsoft

MSSQL

RV-D-700

Создание резервных копий MSSQL средствами PowerShell

TA0009 (Collection)

T1074 (Data Staged), T1213 (Data from Information Repositories)

PowerShell

Microsoft

MSSQL

RV-D-716

Использование процедур для локального выполнения кода

TA0002 (Execution)

T1059 (Command and Scripting Interpreter)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-717

Отправка результатов SQL-запроса почтой

TA0010 (Exfiltration)

T1567 (Exfiltration Over Web Service)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-734

Чтение ключа реестра средствами MSSQL

TA0007 (Discovery)

T1012 (Query Registry), T1082 (System Information Discovery)

Application

Microsoft

MSSQL

RV-D-735

Запись ключа реестра средствами MSSQL

TA0005 (Defense Evasion)

T1112 (Modify Registry)

Application

Microsoft

MSSQL

RV-D-736

Попытка изменить состояние службы Windows

TA0040 (Impact), TA0002 (Execution)

T1489 (Service Stop), T1569 (System Services), T1569.002 (System Services: Service Execution)

Application

Microsoft

MSSQL

RV-D-737

Попытка получить состояние службы Windows

TA0007 (Discovery)

T1007 (System Service Discovery), T1505 (Server Software Component), T1505.001 (Server Software Component: SQL Stored Procedures)

Application

Microsoft

MSSQL

RV-D-738

Попытка подключения к CУБД через DAC

TA0003 (Persistence)

T1505 (Server Software Component)

Application

Microsoft

MSSQL

RV-D-755

Использование хранимых процедур sp_proxy и sp_grant_proxy

TA0003 (Persistence), TA0005 (Defense Evasion)

T1505 (Server Software Component), T1505.001 (Server Software Component: SQL Stored Procedures), T1548 (Abuse Elevation Control Mechanism)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-756

Поиск резервных копий базы данных

TA0007 (Discovery), TA0003 (Persistence)

T1083 (File and Directory Discovery)

dm_exec_cached_plans

Microsoft

MSSQL

RV-D-758

Выгрузка ключа шифрования или сертификата MSSQL

TA0006 (Credential Access)

T1552 (Unsecured Credentials), T1552.004 (Unsecured Credentials: Private Keys), T1649 (Steal or Forge Authentication Certificates)

TrackBackupCrypto.xel

Microsoft

Windows

RV-D-88

Изменение запланированной задачи в групповой политике

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1484 (Domain or Tenant Policy Modification), T1484.001 (Domain or Tenant Policy Modification: Group Policy Modification)

Security

Microsoft

Windows

RV-D-230

Сжатие дамп-файлов средствами 7Zip

TA0009 (Collection)

T1560 (Archive Collected Data), T1560.001 (Archive Collected Data: Archive via Utility)

Security, Sysmon

Microsoft

Windows

RV-D-231

Сжатие дамп-файлов средствами WinRAR

TA0009 (Collection)

T1560 (Archive Collected Data), T1560.001 (Archive Collected Data: Archive via Utility)

Security, Sysmon

Microsoft

Windows

RV-D-232

Использование утилит для создания снимков экрана

TA0009 (Collection)

T1113 (Screen Capture)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-233

Запросы к API Telegram подозрительным процессом

TA0011 (Command and Control)

T1102 (Web Service), T1102.002 (Web Service: Bidirectional Communication), T1567 (Exfiltration Over Web Service)

Sysmon

Microsoft

Windows

RV-D-234

Загрузка файлов с веб-ресурсов стандартными утилитами

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-235

Туннелирование с использованием ngrok

TA0011 (Command and Control)

T1090 (Proxy), T1090.002 (Proxy: External Proxy), T1102 (Web Service), T1572 (Protocol Tunneling)

Security, Sysmon

Microsoft

Windows

RV-D-236

Использование DNS туннеля

TA0011 (Command and Control)

T1048 (Exfiltration Over Alternative Protocol), T1048.003 (Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol), T1071 (Application Layer Protocol), T1071.004 (Application Layer Protocol: DNS)

Sysmon

Microsoft

Windows

RV-D-237

Использование Replace.exe

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-238

Установлено ПО для удаленного доступа

TA0011 (Command and Control), TA0008 (Lateral Movement), TA0003 (Persistence)

T1021 (Remote Services), T1021.005 (Remote Services: VNC), T1133 (External Remote Services), T1219 (Remote Access Tools), T1219.002 (Remote Access Tools: Remote Desktop Software)

Security

Microsoft

Windows

RV-D-239

RDP подключение с использованием туннеля

TA0011 (Command and Control)

T1572 (Protocol Tunneling)

Security, Sysmon

Microsoft

Windows

RV-D-240

Использование утилиты gs-netcat из набора инструментов gsocket

TA0011 (Command and Control)

T1090 (Proxy), T1090.002 (Proxy: External Proxy), T1572 (Protocol Tunneling)

Security, Sysmon

Microsoft

Windows

RV-D-241

Зафиксирована атака типа AS-REP Roasting

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.002 (Valid Accounts: Domain Accounts), T1110 (Brute Force), T1110.002 (Brute Force: Password Cracking), T1558 (Steal or Forge Kerberos Tickets), T1558.004 (Steal or Forge Kerberos Tickets: AS-REP Roasting)

Security

Microsoft

Windows

RV-D-242

Копирование веток реестра, содержащих хеши паролей

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.002 (OS Credential Dumping: Security Account Manager), T1003.004 (OS Credential Dumping: LSA Secrets)

Security

Microsoft

Windows

RV-D-243

Атака DCSync

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.006 (OS Credential Dumping: DCSync)

Security

Microsoft

Windows

RV-D-244

Зафиксирована атака Golden Ticket

TA0006 (Credential Access)

T1558 (Steal or Forge Kerberos Tickets), T1558.001 (Steal or Forge Kerberos Tickets: Golden Ticket)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-245

Обнаружено создание билета TGT при помощи хакерской утилиты

TA0006 (Credential Access)

T1558 (Steal or Forge Kerberos Tickets), T1558.001 (Steal or Forge Kerberos Tickets: Golden Ticket)

Sysmon

Microsoft

Windows

RV-D-246

Попытка дампа процесса LSASS с помощью comsvcs.dll

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory)

Security

Microsoft

Windows

RV-D-247

Дамп LSASS с помощью Python-утилит

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory)

Sysmon

Microsoft

Windows

RV-D-248

Попытка дампа процесса LSASS с помощью утилиты Procdump

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory)

Security, Sysmon

Microsoft

Windows

RV-D-249

Попытка дампа процесса LSASS c помощью утилиты HandleKatz

TA0002 (Execution), TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory), T1106 (Native API)

Sysmon

Microsoft

Windows

RV-D-250

Получение информации о службе RDP через sc.exe

TA0006 (Credential Access)

T1003 (OS Credential Dumping)

Security, Sysmon

Microsoft

Windows

RV-D-251

Обнаружена попытка дампа NTDS.dit

TA0005 (Defense Evasion), TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.003 (OS Credential Dumping: NTDS), T1006 (Direct Volume Access)

Security, Sysmon, PowerShell

Microsoft

Windows

RV-D-252

Атака Password Spraying

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying), T1110.004 (Brute Force: Credential Stuffing)

Security

Microsoft

Windows

RV-D-253

Захват учетных данных с помощью Rpcping.exe

TA0006 (Credential Access)

T1003 (OS Credential Dumping)

Security, Sysmon

Microsoft

Windows

RV-D-254

Подозрительный снэпшот базы данных Active Directory средствами ADExplorer

TA0006 (Credential Access)

T1552 (Unsecured Credentials), T1552.001 (Unsecured Credentials: Credentials In Files), T1552.003 (Unsecured Credentials: Bash History)

Security, Sysmon

Microsoft

Windows

RV-D-255

Поиск процессов с уязвимыми модулями

TA0006 (Credential Access), TA0007 (Discovery)

T1003 (OS Credential Dumping), T1057 (Process Discovery)

Security, Sysmon

Microsoft

Windows

RV-D-256

Зафиксировано использование утилиты RDPStrike

TA0006 (Credential Access), TA0009 (Collection)

T1055 (Process Injection), T1055.001 (Process Injection: Dynamic-link Library Injection), T1056 (Input Capture), T1056.004 (Input Capture: Credential API Hooking), T1212 (Exploitation for Credential Access)

Sysmon

Microsoft

Windows

RV-D-257

Возможно успешный подбор пароля пользователя

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Security

Microsoft

Windows

RV-D-258

Подозрительный доступ к файлу NTDS.dit

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.003 (OS Credential Dumping: NTDS)

Security

Microsoft

Windows

RV-D-259

Чтение процесса LSASS от подозрительного процесса

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory)

Security

Microsoft

Windows

RV-D-260

Подозрительный доступ к памяти процесса LSASS

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory)

Sysmon

Microsoft

Windows

RV-D-261

Дамп LSASS с помощью Диспетчера задач

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory)

Sysmon

Microsoft

Windows

RV-D-262

Подбор пароля учетной записи на хосте

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Security

Microsoft

Windows

RV-D-263

Множественные неудачные попытки аутентификации учетной записи

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Security

Microsoft

Windows

RV-D-264

Перечисление учетных записей в домене методом перебора

TA0006 (Credential Access)

T1087 (Account Discovery), T1087.002 (Account Discovery: Domain Account), T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Security

Microsoft

Windows

RV-D-265

Запуск aspnet_compiler.exe для компиляции приложения в нетипичной директории

TA0005 (Defense Evasion)

T1127 (Trusted Developer Utilities Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-266

Отключение или модификация Windows Audit Log Policy

TA0005 (Defense Evasion)

T1562.002 (Impair Defenses: Disable Windows Event Logging)

Security, Sysmon

Microsoft

Windows

RV-D-267

Журнал событий Windows был очищен

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.001 (Indicator Removal: Clear Windows Event Logs)

Security, System

Microsoft

Windows

RV-D-268

Обход UAC с помощью реестра

TA0005 (Defense Evasion)

T1548 (Abuse Elevation Control Mechanism), T1548.002 (Abuse Elevation Control Mechanism: Bypass User Account Control)

Sysmon

Microsoft

Windows

RV-D-269

Кодирование в Base64 файла в подозрительном каталоге с помощью Certutil

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information)

Security, Sysmon

Microsoft

Windows

RV-D-270

Кодирование файла в Base64 с помощью Certutil

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information)

Security, Sysmon

Microsoft

Windows

RV-D-271

Загрузка модуля в процесс cmstp из нестандартного пути

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.003 (System Binary Proxy Execution: CMSTP)

Sysmon

Microsoft

Windows

RV-D-272

Загрузка процессом cmstp модулей для выполнения скриптов

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.003 (System Binary Proxy Execution: CMSTP)

Sysmon

Microsoft

Windows

RV-D-273

Отключение CrashDump через изменение ветки реестра

TA0005 (Defense Evasion)

T1112 (Modify Registry)

Sysmon

Microsoft

Windows

RV-D-274

Удаленное создание потока процессом, расположенным в подозрительном месте

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Sysmon

Microsoft

Windows

RV-D-275

Атака DCShadow

TA0005 (Defense Evasion)

T1207 (Rogue Domain Controller)

Security

Microsoft

Windows

RV-D-276

Отключение или модификация Windows Defender

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

PowerShell, Security, Sysmon, System

Microsoft

Windows

RV-D-277

Отключение ETW провайдера Windows Defender

TA0005 (Defense Evasion)

T1562.006 (Impair Defenses: Indicator Blocking)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-278

Отключение или модификация Defender Firewall

TA0005 (Defense Evasion)

T1562.004 (Impair Defenses: Disable or Modify System Firewall)

Security, Sysmon

Microsoft

Windows

RV-D-279

Изменение политик Windows Defender Firewall

TA0005 (Defense Evasion)

T1562.004 (Impair Defenses: Disable or Modify System Firewall)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-280

Отключение ETW провайдера .NET

TA0005 (Defense Evasion)

T1562.006 (Impair Defenses: Indicator Blocking)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-281

Отключение службы Windows EventLog

TA0005 (Defense Evasion)

T1562.002 (Impair Defenses: Disable Windows Event Logging)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-282

Отключение сбора событий EventLog через реестр

TA0005 (Defense Evasion)

T1562.002 (Impair Defenses: Disable Windows Event Logging)

Security, Sysmon

Microsoft

Windows

RV-D-283

Создание и удаление файла за короткий промежуток времени при помощи интерпретатора командной строки

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.004 (Indicator Removal: File Deletion), T1071.002 (Application Layer Protocol: File Transfer Protocols)

Sysmon

Microsoft

Windows

RV-D-284

Запуск файла с двойным расширением

TA0005 (Defense Evasion), TA0002 (Execution)

T1036 (Masquerading), T1036.007 (Masquerading: Double File Extension), T1204 (User Execution), T1204.002 (User Execution: Malicious File)

Security, Sysmon

Microsoft

Windows

RV-D-285

Запуск файла без расширения

TA0005 (Defense Evasion)

T1036 (Masquerading), T1036.008 (Masquerading: Masquerade File Type)

Security, Sysmon

Microsoft

Windows

RV-D-286

Эксплуатация утилиты GrimResource

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.014 (System Binary Proxy Execution: MMC)

Security, Sysmon

Microsoft

Windows

RV-D-287

Отключение логирования событий IIS

TA0005 (Defense Evasion)

T1562.002 (Impair Defenses: Disable Windows Event Logging)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-288

Загрузка DLL системным процессом из подозрительного места

TA0005 (Defense Evasion)

T1070 (Indicator Removal)

Sysmon

Microsoft

Windows

RV-D-289

Неподписанная DLL загружена утилитой Windows

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.010 (System Binary Proxy Execution: Regsvr32), T1218.011 (System Binary Proxy Execution: Rundll32)

Sysmon

Microsoft

Windows

RV-D-290

Загрузка файлов с использованием LOLBins InstallUtil.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.004 (System Binary Proxy Execution: InstallUtil)

Security, Sysmon

Microsoft

Windows

RV-D-291

Использование ветки реестра Provisioning_Commands для маскировки запуска программ

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Sysmon

Microsoft

Windows

RV-D-292

Загрузка модуля в процесс mmc из нестандартного пути

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.014 (System Binary Proxy Execution: MMC)

Sysmon

Microsoft

Windows

RV-D-293

Изменение чувствительных значений реестра, предназначенных для ухода от обнаружения

TA0005 (Defense Evasion)

T1112 (Modify Registry)

Sysmon

Microsoft

Windows

RV-D-294

Загрузка процессом mshta модулей для выполнения скриптов

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.005 (System Binary Proxy Execution: Mshta)

Sysmon

Microsoft

Windows

RV-D-295

Сетевое подключение из подозрительной директории

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Sysmon

Microsoft

Windows

RV-D-296

Создание сетевого подключения процессом Winlogon

TA0005 (Defense Evasion), TA0002 (Execution), TA0011 (Command and Control)

T1218 (System Binary Proxy Execution), T1218.011 (System Binary Proxy Execution: Rundll32)

Sysmon

Microsoft

Windows

RV-D-297

Загрузка модуля в процесс odbcconf из нестандартного пути

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.008 (System Binary Proxy Execution: Odbcconf)

Sysmon

Microsoft

Windows

RV-D-298

Запуск потенциально поддельного экземпляра hxtsr.exe

TA0005 (Defense Evasion)

T1036 (Masquerading)

Security, Sysmon

Microsoft

Windows

RV-D-299

Использование устаревшей версии PowerShell v2

TA0005 (Defense Evasion)

T1562.010 (Impair Defenses: Downgrade Attack)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-300

Отключение ETW провайдера PowerShell

TA0005 (Defense Evasion)

T1562.006 (Impair Defenses: Indicator Blocking)

Security, Sysmon

Microsoft

Windows

RV-D-301

Запуск процесса AddinUtil.exe из подозрительной директории.

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-302

Необычное выполнение приложений через AtBroker.EXE

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-303

Установка root сертификата средствами CertMgr.exe

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.004 (Subvert Trust Controls: Install Root Certificate)

Security, Sysmon

Microsoft

Windows

RV-D-304

Скачивание файлов с IP-адреса через CertOC.EXE

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-305

Подозрительная DDL загружена средствами CertOC.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-306

Новый сертификат root был установлен средствами Certutil.exe

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.004 (Subvert Trust Controls: Install Root Certificate)

Security, Sysmon

Microsoft

Windows

RV-D-307

Потенциально вредоносное использование элементов панели управления.

TA0005 (Defense Evasion), TA0002 (Execution), TA0003 (Persistence)

T1218 (System Binary Proxy Execution), T1218.002 (System Binary Proxy Execution: Control Panel), T1546 (Event Triggered Execution)

Security, Sysmon

Microsoft

Windows

RV-D-308

Скачивание файлов через IMEWDBLD.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-309

Дамп памяти процесса средствами Dotnet-Dump

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-310

Попытка дампа оперативной памяти с помощью RdrLeakDiag.exe

TA0005 (Defense Evasion)

T1036 (Masquerading), T1036.001 (Masquerading: Invalid Code Signature)

Security, Sysmon

Microsoft

Windows

RV-D-311

Скачивание файла средствами MpCmpRun.EXE

TA0005 (Defense Evasion), TA0011 (Command and Control)

T1105 (Ingress Tool Transfer), T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-312

Запуск подозрительного cab файла через msdt.exe

TA0005 (Defense Evasion)

T1202 (Indirect Command Execution)

Security, Sysmon

Microsoft

Windows

RV-D-313

Скачивание файлов через msedge_proxy.exe

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-314

Вызов функции DllUnregisterServer через Msiexec.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.007 (System Binary Proxy Execution: Msiexec)

Security, Sysmon

Microsoft

Windows

RV-D-315

Запуск произвольной DLL библиотеки средствами Msiexec.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.007 (System Binary Proxy Execution: Msiexec)

Security, Sysmon

Microsoft

Windows

RV-D-316

Скачивание файлов через PresentationHost.exe

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-317

Скачивание файла средствами ProtocolHandler

TA0005 (Defense Evasion), TA0011 (Command and Control)

T1105 (Ingress Tool Transfer), T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-318

Отключение снапшотов томов

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Security, Sysmon

Microsoft

Windows

RV-D-319

Защита от записи для хранилища отключена

TA0005 (Defense Evasion)

-

Security, Sysmon

Microsoft

Windows

RV-D-320

Подозрительное выполнение Regasm/Regsvcs с нестандартным расширением

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.009 (System Binary Proxy Execution: Regsvcs/Regasm)

Security, Sysmon

Microsoft

Windows

RV-D-321

Импорт ключа реестра из ADS

TA0005 (Defense Evasion)

T1112 (Modify Registry)

Security, Sysmon

Microsoft

Windows

RV-D-322

Скачивание файлов через Squirrel.exe

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-323

Скачивание файлов средствами MS-AppInstaller

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-324

Дамп памяти ядра через LiveKD

TA0006 (Credential Access)

T1003 (OS Credential Dumping)

Security, Sysmon

Microsoft

Windows

RV-D-325

Создание нового процесса с помощью Taskmgr.exe

TA0005 (Defense Evasion)

T1036 (Masquerading)

Security, Sysmon

Microsoft

Windows

RV-D-326

Необычный аргумент или дочерний процесс Wlrmdr.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-327

Подозрительный агент обновления Windows

TA0005 (Defense Evasion)

T1036 (Masquerading)

Security, Sysmon

Microsoft

Windows

RV-D-328

Изменение чувствительных параметров RDP

TA0005 (Defense Evasion), TA0003 (Persistence)

T1112 (Modify Registry)

Sysmon

Microsoft

Windows

RV-D-329

Порт RDP по умолчанию изменен на нестандартный

TA0005 (Defense Evasion)

T1547 (Boot or Logon Autostart Execution), T1547.010 (Boot or Logon Autostart Execution: Port Monitors)

Sysmon

Microsoft

Windows

RV-D-330

Изменена очередь загрузки драйвера Sysmon

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Sysmon

Microsoft

Windows

RV-D-331

Изменение разрешения доступа к каналу Winevt через реестр.

TA0005 (Defense Evasion)

T1562.002 (Impair Defenses: Disable Windows Event Logging)

Sysmon

Microsoft

Windows

RV-D-332

Отключение в реестре HECI

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Sysmon

Microsoft

Windows

RV-D-333

Отключение Административных общих ресурсов при запуске.

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.005 (Indicator Removal: Network Share Connection Removal)

Sysmon

Microsoft

Windows

RV-D-334

Отключение Privacy Settings Experience в реестре.

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Sysmon

Microsoft

Windows

RV-D-335

Отключение контроль учетных записей пользователей (UAC) в реестре.

TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1548 (Abuse Elevation Control Mechanism), T1548.002 (Abuse Elevation Control Mechanism: Bypass User Account Control)

Sysmon

Microsoft

Windows

RV-D-336

Включение в реестре DNS-over-HTTPS.

TA0005 (Defense Evasion)

T1112 (Modify Registry), T1490 (Inhibit System Recovery)

Sysmon

Microsoft

Windows

RV-D-337

Установка нового значения DNS ServerLevelPluginDll

TA0005 (Defense Evasion)

T1112 (Modify Registry), T1574 (Hijack Execution Flow), T1574.002 (DLL Side-Loading)

Sysmon

Microsoft

Windows

RV-D-338

Подозрительная модификация ключей реестра COM/WMI

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Sysmon

Microsoft

Windows

RV-D-339

Модификация скрытых ключей Проводника

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.001 (Hide Artifacts: Hidden Files and Directories)

Sysmon

Microsoft

Windows

RV-D-340

Скрытие задачи по расписанию с помощью Index Value Tamper

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.001 (Hide Artifacts: Hidden Files and Directories)

Sysmon

Microsoft

Windows

RV-D-341

Подозрительный путь в значении реестра Keyboard Layout IME

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

Sysmon

Microsoft

Windows

RV-D-342

Включение хранение хеша LM

TA0005 (Defense Evasion)

T1112 (Modify Registry)

Sysmon

Microsoft

Windows

RV-D-343

Загрузка модуля в процесс regsvr32 из нестандартного пути

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.010 (System Binary Proxy Execution: Regsvr32)

Sysmon

Microsoft

Windows

RV-D-344

Выполнение скриптов через regsvr32

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.010 (System Binary Proxy Execution: Regsvr32)

Sysmon

Microsoft

Windows

RV-D-345

Загрузка модуля в процесс rundll32 из нестандартного пути

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.011 (System Binary Proxy Execution: Rundll32)

Sysmon

Microsoft

Windows

RV-D-346

Загрузка процессом rundll32 модулей для выполнения скриптов

TA0005 (Defense Evasion), TA0002 (Execution)

T1129 (Shared Modules), T1218 (System Binary Proxy Execution), T1218.011 (System Binary Proxy Execution: Rundll32)

Sysmon

Microsoft

Windows

RV-D-347

Ослабление защиты или мониторинга системы

TA0005 (Defense Evasion)

T1562.001 (Impair Defenses: Disable or Modify Tools)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-348

Закрепление через ключ реестра ReflectDebugger утилиты WerFault

TA0005 (Defense Evasion), TA0003 (Persistence)

T1036 (Masquerading), T1036.003 (Masquerading: Rename Legitimate Utilities), T1112 (Modify Registry)

Security, Sysmon

Microsoft

Windows

RV-D-349

Обнаружен запуск XSL скрипта

TA0005 (Defense Evasion)

T1220 (XSL Script Processing)

Security, Sysmon

Microsoft

Windows

RV-D-350

Зафиксирована разведка учетных записей

TA0007 (Discovery)

T1059 (Command and Scripting Interpreter), T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1087.002 (Account Discovery: Domain Account)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-351

Разведка системы при помощи WMI

TA0007 (Discovery)

T1047 (Windows Management Instrumentation), T1592 (Gather Victim Host Information), T1592.004 (Gather Victim Host Information: Client Configurations)

Security

Microsoft

Windows

RV-D-352

Разведка процессов

TA0007 (Discovery)

T1047 (Windows Management Instrumentation), T1057 (Process Discovery), T1059 (Command and Scripting Interpreter), T1592 (Gather Victim Host Information), T1592.002 (Gather Victim Host Information: Software)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-353

Разведка доменных трастов

TA0002 (Execution), TA0007 (Discovery)

T1059 (Command and Scripting Interpreter), T1482 (Domain Trust Discovery), T1590 (Gather Victim Network Information), T1590.003 (Gather Victim Network Information: Network Trust Dependencies)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-354

Зафиксировано изучение общих сетевых ресурсов

TA0007 (Discovery)

T1047 (Windows Management Instrumentation), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1135 (Network Share Discovery)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-355

Выполнение Sysinternals PsSuspend

TA0007 (Discovery), TA0003 (Persistence)

T1543 (Create or Modify System Process), T1543.003 (Create or Modify System Process: Windows Service)

Security, Sysmon

Microsoft

Windows

RV-D-356

Перечисление ключей реестра для разведки

TA0007 (Discovery)

T1012 (Query Registry)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-357

Перечисление ключей реестра, которые могут быть интересны при разведке

TA0007 (Discovery)

T1012 (Query Registry)

Security

Microsoft

Windows

RV-D-358

Выполнение разведки удаленных систем

TA0007 (Discovery)

T1018 (Remote System Discovery), T1047 (Windows Management Instrumentation), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-359

Изучение конфигурации локальной системы

TA0007 (Discovery)

T1047 (Windows Management Instrumentation), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1082 (System Information Discovery), T1592 (Gather Victim Host Information), T1592.004 (Gather Victim Host Information: Client Configurations)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-360

Сбор информации о сетевых подключениях

TA0007 (Discovery)

T1049 (System Network Connections Discovery), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-361

Зафиксировано изучение системного времени

TA0007 (Discovery)

T1047 (Windows Management Instrumentation), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1124 (System Time Discovery)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-362

Запуск whoami с правами системы

TA0007 (Discovery)

T1033 (System Owner/User Discovery)

Security, Sysmon

Microsoft

Windows

RV-D-363

Запуск интерпретатора командной строки от WinRAR

TA0002 (Execution), TA0005 (Defense Evasion)

T1027.015 (Obfuscated Files or Information: Compression), T1203 (Exploitation for Client Execution)

Security, Sysmon

Microsoft

Windows

RV-D-364

Эксплуатация уязвимости CVE-2023-46944 в расширении GitLens для VSCode на Windows

TA0002 (Execution)

T1203 (Exploitation for Client Execution)

Security, Sysmon

Microsoft

Windows

RV-D-365

Зафиксировано использование хакерской утилиты DSInternals

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1201 (Password Policy Discovery), T1484 (Domain or Tenant Policy Modification), T1558 (Steal or Forge Kerberos Tickets)

PowerShell

Microsoft

Windows

RV-D-366

Зафиксировано использование хакерской утилиты nishang

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory), T1003.002 (OS Credential Dumping: Security Account Manager), T1005 (Data from Local System), T1027 (Obfuscated Files or Information), T1027.010 (Obfuscated Files or Information: Command Obfuscation), T1041 (Exfiltration Over C2 Channel), T1046 (Network Service Discovery), T1056 (Input Capture), T1056.001 (Input Capture: Keylogging), T1056.002 (Input Capture: GUI Input Capture), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1082 (System Information Discovery), T1087 (Account Discovery), T1102 (Web Service), T1105 (Ingress Tool Transfer), T1218 (System Binary Proxy Execution), T1218.004 (System Binary Proxy Execution: InstallUtil), T1218.011 (System Binary Proxy Execution: Rundll32), T1547 (Boot or Logon Autostart Execution), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), T1564 (Hide Artifacts), T1564.004 (Hide Artifacts: NTFS File Attributes), T1566 (Phishing)

PowerShell

Microsoft

Windows

RV-D-367

Зафиксировано использование хакерской утилиты OWA-Toolkit

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1114 (Email Collection), T1133 (External Remote Services), T1560 (Archive Collected Data)

PowerShell

Microsoft

Windows

RV-D-368

Зафиксировано использование хакерской утилиты PowerShell-Suit

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory), T1021 (Remote Services), T1021.006 (Remote Services: Windows Remote Management), T1057 (Process Discovery), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell)

PowerShell

Microsoft

Windows

RV-D-369

Зафиксировано использование хакерской утилиты PowerShellArsenal

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory), T1021 (Remote Services), T1021.006 (Remote Services: Windows Remote Management), T1057 (Process Discovery), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell)

PowerShell

Microsoft

Windows

RV-D-370

Загрузка файлов с удаленного сервера при помощи PowerShell

TA0008 (Lateral Movement)

T1021 (Remote Services), T1021.004 (Remote Services: SSH), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1105 (Ingress Tool Transfer), T1566 (Phishing), T1566.002 (Phishing: Spearphishing Link)

PowerShell

Microsoft

Windows

RV-D-371

Зафиксировано возможное использование обфускации Powesrhell

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information), T1027.010 (Obfuscated Files or Information: Command Obfuscation), T1027.015 (Obfuscated Files or Information: Compression), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell)

PowerShell

Microsoft

Windows

RV-D-372

Зафиксирована маскировка запуска PowerShell

TA0005 (Defense Evasion)

T1036 (Masquerading), T1036.005 (Masquerading: Match Legitimate Resource Name or Location), T1036.006 (Masquerading: Match Legitimate Resource Name or Location), T1036.007 (Masquerading: Double File Extension), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell)

Sysmon

Microsoft

Windows

RV-D-373

Зафиксировано использование WinApi через PowerShell

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information), T1055 (Process Injection), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1106 (Native API)

PowerShell

Microsoft

Windows

RV-D-374

Зафиксировано использование хакерской утилиты PowerSploit

TA0005 (Defense Evasion), TA0004 (Privilege Escalation), TA0003 (Persistence), TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1005 (Data from Local System), T1006 (Direct Volume Access), T1012 (Query Registry), T1027 (Obfuscated Files or Information), T1027.005 (Obfuscated Files or Information: Indicator Removal from Tools), T1027.010 (Obfuscated Files or Information: Command Obfuscation), T1047 (Windows Management Instrumentation), T1053 (Scheduled Task/Job), T1053.002 (Scheduled Task/Job: At), T1053.005 (Scheduled Task/Job: Scheduled Task), T1055 (Process Injection), T1055.001 (Process Injection: Dynamic-link Library Injection), T1056 (Input Capture), T1057 (Process Discovery), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1113 (Screen Capture), T1123 (Audio Capture), T1134 (Access Token Manipulation), T1212 (Exploitation for Credential Access), T1222 (File and Directory Permissions Modification), T1222.001 (File and Directory Permissions Modification: Windows File and Directory Permissions Modification), T1482 (Domain Trust Discovery), T1543 (Create or Modify System Process), T1543.003 (Create or Modify System Process: Windows Service), T1547 (Boot or Logon Autostart Execution), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), T1547.005 (Boot or Logon Autostart Execution: Security Support Provider), T1552 (Unsecured Credentials), T1552.002 (Unsecured Credentials: Credentials in Registry), T1552.006 (Unsecured Credentials: Group Policy Preferences), T1555 (Credentials from Password Stores), T1555.004 (Credentials from Password Stores: Windows Credential Manager), T1558 (Steal or Forge Kerberos Tickets), T1558.003 (Steal or Forge Kerberos Tickets: Kerberoasting), T1574 (Hijack Execution Flow), T1574.001 (Hijack Execution Flow: DLL), T1574.007 (Hijack Execution Flow: Path Interception by PATH Environment Variable), T1574.008 (Hijack Execution Flow: Path Interception by Search Order Hijacking), T1574.009 (Hijack Execution Flow: Path Interception by Unquoted Path), T1588 (Obtain Capabilities), T1588.002 (Obtain Capabilities: Tool), T1620 (Reflective Code Loading)

PowerShell

Microsoft

Windows

RV-D-375

Зафиксировано использование хакерской утилиты PSMapExec

TA0008 (Lateral Movement)

T1021 (Remote Services), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1078 (Valid Accounts), T1558 (Steal or Forge Kerberos Tickets), T1558.001 (Steal or Forge Kerberos Tickets: Golden Ticket), T1569 (System Services)

PowerShell

Microsoft

Windows

RV-D-376

Зафиксировано использование хакерской утилиты SharpHound

TA0007 (Discovery)

T1018 (Remote System Discovery), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1482 (Domain Trust Discovery)

PowerShell

Microsoft

Windows

RV-D-377

Создание запланированной задачи через FileCreation

TA0002 (Execution), TA0003 (Persistence), TA0004 (Privilege Escalation)

T1053 (Scheduled Task/Job), T1053.005 (Scheduled Task/Job: Scheduled Task)

Sysmon

Microsoft

Windows

RV-D-378

Процесс загрузил модуль по UNC-пути

TA0002 (Execution)

T1129 (Shared Modules)

Sysmon

Microsoft

Windows

RV-D-379

URL-схема в командной строке процесса

TA0002 (Execution)

T1129 (Shared Modules)

Security

Microsoft

Windows

RV-D-380

Использование вредоносных утилит

TA0005 (Defense Evasion), TA0002 (Execution)

T1006 (Direct Volume Access), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-381

PowerShell инициировал сетевое подключение

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell)

Sysmon

Microsoft

Windows

RV-D-382

Эксплуатация уязвимости в WinRAR - CVE-2023-38831

TA0002 (Execution)

T1203 (Exploitation for Client Execution)

Sysmon

Microsoft

Windows

RV-D-383

Зафиксированы подозрительные операции при помощи WMI

-

-

Security

Microsoft

Windows

RV-D-384

Потенциальное выполнение скрипта через WScript/CScript

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.005 (Command and Scripting Interpreter: Visual Basic), T1059.007 (Command and Scripting Interpreter: JavaScript)

Security, Sysmon

Microsoft

Windows

RV-D-385

Использование PowerShell через сторонние инструменты

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell)

Sysmon

Microsoft

Windows

RV-D-386

Изменение пароля пользователя или хоста с помощью Ksetup.exe

TA0040 (Impact)

T1531 (Account Access Removal)

Security, Sysmon

Microsoft

Windows

RV-D-387

Добавление потенциально подозрительного источника загрузки в Winget

TA0011 (Command and Control)

T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-388

Извлечение cab-файлов через Wusa.EXE

TA0002 (Execution)

-

Security, Sysmon

Microsoft

Windows

RV-D-389

Изменение политики выполнения PowerShell

TA0005 (Defense Evasion)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell)

Sysmon

Microsoft

Windows

RV-D-390

Запуск скрипта из временной директории

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1059.005 (Command and Scripting Interpreter: Visual Basic), T1059.006 (Command and Scripting Interpreter: Python), T1059.007 (Command and Scripting Interpreter: JavaScript)

Security, Sysmon

Microsoft

Windows

RV-D-391

Создание Self Extracting Package в подозрительном месте

TA0002 (Execution)

T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-392

Создание или изменение сервиса с помощью утилит в командной строке

TA0040 (Impact)

T1489 (Service Stop)

Security

Microsoft

Windows

RV-D-393

Создан сервис с подозрительными параметрами

TA0002 (Execution)

T1569 (System Services), T1569.002 (System Services: Service Execution)

Security

Microsoft

Windows

RV-D-394

Изменение критичных параметров сервиса

TA0002 (Execution)

T1569 (System Services), T1569.002 (System Services: Service Execution)

Security, Sysmon

Microsoft

Windows

RV-D-395

Изменение пути до исполняемого файла в сервисе нестандартными путями

TA0002 (Execution)

T1569 (System Services), T1569.002 (System Services: Service Execution)

Security, Sysmon

Microsoft

Windows

RV-D-396

Установлен сервис не из системного/стандартного пути

TA0002 (Execution)

T1569 (System Services), T1569.002 (System Services: Service Execution)

Security

Microsoft

Windows

RV-D-397

Использование библиотеки cygwin1.dll

TA0011 (Command and Control)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell)

Sysmon

Microsoft

Windows

RV-D-398

Выполнение команд в системе от редактора кода VSCode

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1176 (Software Extensions), T1176.002 (Software Extensions: IDE Extensions), T1204 (User Execution), T1204.001 (User Execution: Malicious Link)

Security, Sysmon

Microsoft

Windows

RV-D-399

Удаленное подключение к узлу через туннелирование в VSCode

TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1176 (Software Extensions), T1176.002 (Software Extensions: IDE Extensions), T1204 (User Execution), T1204.001 (User Execution: Malicious Link), T1219 (Remote Access Tools), T1219.001 (Remote Access Tools: IDE Tunneling), T1572 (Protocol Tunneling)

Security, Sysmon

Microsoft

Windows

RV-D-400

Зафиксирована загрузка модуля WMI подозрительным процессом

TA0002 (Execution)

T1047 (Windows Management Instrumentation)

Sysmon

Microsoft

Windows

RV-D-401

Экспорт структуры AD через csvde.exe

TA0007 (Discovery)

T1087 (Account Discovery), T1087.002 (Account Discovery: Domain Account)

Security, Sysmon

Microsoft

Windows

RV-D-402

Сбор структуры AD cредствами Ldifde

TA0009 (Collection), TA0002 (Execution)

T1005 (Data from Local System)

Security, Sysmon

Microsoft

Windows

RV-D-403

Загрузка amsi.dll необычным процессом.

TA0005 (Defense Evasion), TA0040 (Impact)

T1490 (Inhibit System Recovery)

Sysmon

Microsoft

Windows

RV-D-404

Загрузка RstrtMgr.dll необычным процессом

TA0005 (Defense Evasion), TA0040 (Impact)

T1486 (Data Encrypted for Impact), T1562.001 (Impair Defenses: Disable or Modify Tools)

Sysmon

Microsoft

Windows

RV-D-405

Изменение фона рабочего стола через реестр

TA0005 (Defense Evasion), TA0040 (Impact)

T1112 (Modify Registry), T1491 (Defacement), T1491.001 (Defacement: Internal Defacement)

Sysmon

Microsoft

Windows

RV-D-406

Отключение системы восстановления в реестре.

TA0040 (Impact)

T1490 (Inhibit System Recovery)

Sysmon

Microsoft

Windows

RV-D-407

Манипуляции с теневыми копиями с помощью встроенных утилит

TA0040 (Impact)

T1490 (Inhibit System Recovery)

Security

Microsoft

Windows

RV-D-408

Вход на устройство под разными учетными записями

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts)

Security

Microsoft

Windows

RV-D-409

Интерактивный вход под сервисной учетной записью

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts)

Security

Microsoft

Windows

RV-D-410

Вход под несуществующим пользователем

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts)

Security

Microsoft

Windows

RV-D-411

Вход под учетной записью, созданной по умолчанию

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.001 (Valid Accounts: Default Accounts)

Security

Microsoft

Windows

RV-D-412

Вход под учётной записью администратора

TA0005 (Defense Evasion), TA0003 (Persistence), TA0004 (Privilege Escalation), TA0001 (Initial Access)

T1078 (Valid Accounts)

Security

Microsoft

Windows

RV-D-413

Вход с разных хостов на один хост под одной учетной записью

TA0001 (Initial Access)

T1078 (Valid Accounts)

Security

Microsoft

Windows

RV-D-414

Вход на несколько узлов под одной учетной записью

TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.002 (Valid Accounts: Domain Accounts)

Security

Microsoft

Windows

RV-D-415

Зафиксирована установка удаленной сессии при помощи WMI

TA0008 (Lateral Movement)

T1047 (Windows Management Instrumentation)

Security

Microsoft

Windows

RV-D-416

Использование инструмента SharpMove

TA0008 (Lateral Movement)

T1021 (Remote Services), T1021.002 (Remote Services: SMB/Windows Admin Shares)

Security, Sysmon

Microsoft

Windows

RV-D-417

Удаленный запуск процесса с помощью DCOM объекта MMC20.Application

TA0008 (Lateral Movement)

T1021 (Remote Services), T1021.003 (Remote Services: Distributed Component Object Model)

Security

Microsoft

Windows

RV-D-418

Удаленная эксплуатация DCOM объекта ShellWindows

TA0008 (Lateral Movement)

T1021 (Remote Services), T1021.003 (Remote Services: Distributed Component Object Model)

Security

Microsoft

Windows

RV-D-419

Удаленный запуск процесса с помощью WMI

TA0008 (Lateral Movement)

T1021 (Remote Services)

Security

Microsoft

Windows

RV-D-420

Подключение к SMB папке по протоколу QUIC

TA0008 (Lateral Movement)

T1570 (Lateral Tool Transfer)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-421

Удаленное выполнение команд с помощью SMBExec

TA0003 (Persistence), TA0008 (Lateral Movement), TA0002 (Execution)

T1021 (Remote Services), T1021.002 (Remote Services: SMB/Windows Admin Shares), T1543 (Create or Modify System Process), T1543.003 (Create or Modify System Process: Windows Service), T1569 (System Services), T1569.002 (System Services: Service Execution), T1570 (Lateral Tool Transfer)

Security

Microsoft

Windows

RV-D-422

Создание новой доменной\локальной\компьютерной учетной записи

TA0003 (Persistence)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account), T1136.002 (Create Account: Domain Account)

Security

Microsoft

Windows

RV-D-423

Закрепление через ключ реестра Debugger отладчика AeDebug

TA0003 (Persistence)

T1547 (Boot or Logon Autostart Execution)

Sysmon

Microsoft

Windows

RV-D-424

Смена ассоциации запуска файла

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.001 (Event Triggered Execution: Change Default File Association)

Sysmon

Microsoft

Windows

RV-D-425

Изменение пароля через утилиту mimikatz

TA0003 (Persistence)

T1098 (Account Manipulation)

Security

Microsoft

Windows

RV-D-426

Удаление доменной\локальной\компьютерной учетной записи

TA0003 (Persistence)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account), T1136.002 (Create Account: Domain Account)

Security

Microsoft

Windows

RV-D-427

Зафиксировано добавление в AppCert DLL полезной нагрузки

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.009 (Event Triggered Execution: AppCert DLLs)

Sysmon

Microsoft

Windows

RV-D-428

Зафиксировано добавление в Appinit DLL полезной нагрузки

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.010 (Event Triggered Execution: AppInit DLLs)

Sysmon

Microsoft

Windows

RV-D-429

Зафиксирована подмена файлов, отвечающих за функции специальных возможностей Windows

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.008 (Event Triggered Execution: Accessibility Features)

Sysmon

Microsoft

Windows

RV-D-430

Cоздание WMI подписки

TA0002 (Execution)

T1047 (Windows Management Instrumentation), T1546 (Event Triggered Execution), T1546.003 (Event Triggered Execution: Windows Management Instrumentation Event Subscription)

Sysmon

Microsoft

Windows

RV-D-431

Внедрение стороннего ПО через отладчик IFEO

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.012 (Event Triggered Execution: Image File Execution Options Injection)

Sysmon

Microsoft

Windows

RV-D-432

Добавление в Netsh Helper DLL потенциальной полезной нагрузки

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.007 (Event Triggered Execution: Netsh Helper DLL)

Sysmon

Microsoft

Windows

RV-D-433

Зафиксировано добавление исполняемого файла к профилю PowerShell

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.013 (Event Triggered Execution: PowerShell Profile)

PowerShell, Sysmon

Microsoft

Windows

RV-D-434

Закрепление через Shim

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.011 (Event Triggered Execution: Application Shimming)

Security, Sysmon

Microsoft

Windows

RV-D-435

Создана учетная запись пользователя, замаскированная под учетную запись компьютера

TA0003 (Persistence)

-

Security

Microsoft

Windows

RV-D-436

Включение или отключение учетной записи

TA0003 (Persistence)

T1098 (Account Manipulation)

Security

Microsoft

Windows

RV-D-437

Создание и удаление учетной записи в течении одной минуты

TA0003 (Persistence)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account), T1136.002 (Create Account: Domain Account)

Security

Microsoft

Windows

RV-D-438

Изменение SPN учетной записи

TA0004 (Privilege Escalation)

T1098 (Account Manipulation)

Security

Microsoft

Windows

RV-D-439

Эксплуатация сценариев входа в систему

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1037 (Boot or Logon Initialization Scripts), T1037.001 (Boot or Logon Initialization Scripts: Logon Script (Windows))

Security, Sysmon

Microsoft

Windows

RV-D-440

Закрепление в системе путем изменения ключей автозапуска в реестре

TA0003 (Persistence)

T1547 (Boot or Logon Autostart Execution), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder)

Sysmon

Microsoft

Windows

RV-D-441

Зафиксировано возможное закрепление в системе посредством помещения файла в директорию автозагрузки

TA0003 (Persistence)

T1547 (Boot or Logon Autostart Execution), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder)

Security, Sysmon

Microsoft

Windows

RV-D-442

Эксплуатация Active Setup в реестре

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1547 (Boot or Logon Autostart Execution), T1547.014 (Boot or Logon Autostart Execution: Active Setup)

Security, Sysmon

Microsoft

Windows

RV-D-443

Закрепление в системе посредством создания/изменения пакетов проверки подлинности в реестре

TA0003 (Persistence)

T1547 (Boot or Logon Autostart Execution), T1547.002 (Boot or Logon Autostart Execution: Authentication Package)

Security, Sysmon

Microsoft

Windows

RV-D-444

Закрепление через COM Hijacking

TA0003 (Persistence), TA0004 (Privilege Escalation), TA0002 (Execution)

T1546 (Event Triggered Execution), T1546.015 (Event Triggered Execution: Component Object Model Hijacking), T1559 (Inter-Process Communication), T1559.001 (Inter-Process Communication: Component Object Model)

Sysmon

Microsoft

Windows

RV-D-445

Эксплуатация драйверов LSASS в реестре

TA0003 (Persistence)

T1547 (Boot or Logon Autostart Execution), T1547.008 (Boot or Logon Autostart Execution: LSASS Driver)

Security, Sysmon

Microsoft

Windows

RV-D-446

Эксплуатация Port Monitors в реестре

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1547 (Boot or Logon Autostart Execution), T1547.010 (Boot or Logon Autostart Execution: Port Monitors)

Security, Sysmon

Microsoft

Windows

RV-D-447

Закрепление в системе посредством эксплуатации Print Processors в файловой системе через подозрительную dll

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1547 (Boot or Logon Autostart Execution), T1547.012 (Boot or Logon Autostart Execution: Print Processors)

Security, Sysmon

Microsoft

Windows

RV-D-448

Закрепление в системе посредством эксплуатации Print Processors в реестре

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1547 (Boot or Logon Autostart Execution), T1547.012 (Boot or Logon Autostart Execution: Print Processors)

Security, Sysmon

Microsoft

Windows

RV-D-449

Закрепление в системе посредством эксплуатации SSP (Security Support Provider) в реестре

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1547 (Boot or Logon Autostart Execution), T1547.005 (Boot or Logon Autostart Execution: Security Support Provider)

Security, Sysmon

Microsoft

Windows

RV-D-450

Создания/изменения ключей поставщиков времени в реестре

TA0003 (Persistence)

T1547 (Boot or Logon Autostart Execution), T1547.003 (Boot or Logon Autostart Execution: Time Providers)

Security, Sysmon

Microsoft

Windows

RV-D-451

Добавление в реестр автозапускаемых файлов процессом Winlogon

TA0003 (Persistence)

T1547 (Boot or Logon Autostart Execution), T1547.004 (Boot or Logon Autostart Execution: Winlogon Helper DLL)

Security, Sysmon

Microsoft

Windows

RV-D-452

Произошло выполнение полезной нагрузки при наступлении WMI события

TA0002 (Execution)

T1047 (Windows Management Instrumentation), T1546 (Event Triggered Execution), T1546.003 (Event Triggered Execution: Windows Management Instrumentation Event Subscription)

Sysmon

Microsoft

Windows

RV-D-453

Запуск файла из Корзины

TA0003 (Persistence), TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.001 (Hide Artifacts: Hidden Files and Directories)

Security, Sysmon

Microsoft

Windows

RV-D-454

Включение переменных среды COR Profiler

TA0003 (Persistence), TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1574 (Hijack Execution Flow), T1574.012 (Hijack Execution Flow: COR_PROFILER)

Sysmon

Microsoft

Windows

RV-D-455

Закрепление в системе через ключ реестра MyComputer

TA0003 (Persistence)

-

Sysmon

Microsoft

Windows

RV-D-456

Изменение настроек администратора Winget

TA0005 (Defense Evasion), TA0003 (Persistence)

-

Sysmon

Microsoft

Windows

RV-D-457

Сброс пароля от учетной записи через утилиту mimikatz

TA0003 (Persistence)

T1098 (Account Manipulation)

Security

Microsoft

Windows

RV-D-458

Манипулирование запланированными задачами через реестр

TA0003 (Persistence)

T1053 (Scheduled Task/Job), T1053.005 (Scheduled Task/Job: Scheduled Task)

Sysmon

Microsoft

Windows

RV-D-459

Изменения в планировщике задач

TA0003 (Persistence), TA0002 (Execution)

T1053 (Scheduled Task/Job), T1053.002 (Scheduled Task/Job: At), T1053.005 (Scheduled Task/Job: Scheduled Task)

Security

Microsoft

Windows

RV-D-460

Загрузка несуществующей dll для сервисов IKE, IKEEXT, SessionEnv

TA0005 (Defense Evasion), TA0003 (Persistence)

T1574 (Hijack Execution Flow), T1574.001 (Hijack Execution Flow: DLL), T1574.002 (DLL Side-Loading)

Sysmon

Microsoft

Windows

RV-D-461

Зафиксирована подгрузка подозрительного пакета процессом LSA

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1547 (Boot or Logon Autostart Execution), T1547.005 (Boot or Logon Autostart Execution: Security Support Provider)

Security

Microsoft

Windows

RV-D-462

Зафиксирована подмена файлов экрана заставки Windows

TA0003 (Persistence)

T1546 (Event Triggered Execution), T1546.002 (Event Triggered Execution: Screensaver)

Sysmon

Microsoft

Windows

RV-D-463

Добавление пользователя в критичные доменные группы

TA0003 (Persistence)

T1098 (Account Manipulation), T1098.007 (Account Manipulation: Additional Local or Domain Groups)

Security

Microsoft

Windows

RV-D-464

Добавление пользователя в критичные локальные группы

TA0003 (Persistence)

T1098 (Account Manipulation), T1098.007 (Account Manipulation: Additional Local or Domain Groups)

Security

Microsoft

Windows

RV-D-465

Выполнение манипуляций над учетной записи с помощью стороннего ПО

TA0003 (Persistence)

T1098 (Account Manipulation), T1136 (Create Account), T1136.001 (Create Account: Local Account), T1136.002 (Create Account: Domain Account)

Security

Microsoft

Windows

RV-D-466

Обнаружено использование службы BITS Jobs

TA0003 (Persistence)

T1197 (BITS Jobs)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-467

Удалена глобальная группа с включенной безопасностью

TA0003 (Persistence)

T1098 (Account Manipulation)

Security

Microsoft

Windows

RV-D-468

Детектирование создания wmi подписки

TA0002 (Execution)

T1047 (Windows Management Instrumentation), T1546 (Event Triggered Execution), T1546.003 (Event Triggered Execution: Windows Management Instrumentation Event Subscription)

Security

Microsoft

Windows

RV-D-469

Создание удаленного потока c использованием функции LoadLibrary

TA0005 (Defense Evasion)

T1055 (Process Injection), T1055.001 (Process Injection: Dynamic-link Library Injection)

Sysmon

Microsoft

Windows

RV-D-470

Создание удаленного потока подозрительным процессом.

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1055 (Process Injection)

Sysmon

Microsoft

Windows

RV-D-471

Изменена групповая политика домена по умолчанию

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1484 (Domain or Tenant Policy Modification), T1484.001 (Domain or Tenant Policy Modification: Group Policy Modification)

Security

Microsoft

Windows

RV-D-472

Кража токена доступа из системного процесса

TA0004 (Privilege Escalation)

T1134 (Access Token Manipulation), T1134.001 (Access Token Manipulation: Token Impersonation/Theft)

Sysmon

Microsoft

Windows

RV-D-473

Удален объект групповой политики

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1484 (Domain or Tenant Policy Modification), T1484.001 (Domain or Tenant Policy Modification: Group Policy Modification)

Security

Microsoft

Windows

RV-D-474

Изменение атрибутов групповой политики

TA0004 (Privilege Escalation)

T1484 (Domain or Tenant Policy Modification), T1484.001 (Domain or Tenant Policy Modification: Group Policy Modification)

Security

Microsoft

Windows

RV-D-475

Кража токена через именованные каналы

TA0005 (Defense Evasion)

T1134 (Access Token Manipulation), T1134.001 (Access Token Manipulation: Token Impersonation/Theft)

Sysmon

Microsoft

Windows

RV-D-476

Несистемный процесс повысил привилегии до системных (CreateProcessWithToken)

TA0004 (Privilege Escalation)

T1134 (Access Token Manipulation)

Security

Microsoft

Windows

RV-D-477

Несистемный процесс повысил привилегии до системного

TA0004 (Privilege Escalation)

T1134 (Access Token Manipulation)

Security, Sysmon

Microsoft

Windows

RV-D-478

Изменение дескриптора безопасности в групповой политике

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1484 (Domain or Tenant Policy Modification), T1484.001 (Domain or Tenant Policy Modification: Group Policy Modification)

Security

Microsoft

Windows

RV-D-490

Поиск данных в сетевых папках Windows

TA0009 (Collection)

T1039 (Data from Network Shared Drive)

Security

Microsoft

Windows

RV-D-491

Размещение архивов в сетевой папке Windows

TA0009 (Collection)

T1074 (Data Staged), T1074.002 (Data Staged: Remote Data Staging), T1560 (Archive Collected Data)

Security

Microsoft

Windows

RV-D-493

Доступ к чувствительному сетевому диску Windows

TA0009 (Collection)

T1039 (Data from Network Shared Drive)

Security

Microsoft

Windows

RV-D-494

Использование утилиты Smbtakeover

TA0006 (Credential Access), TA0008 (Lateral Movement), TA0002 (Execution)

T1021 (Remote Services), T1021.002 (Remote Services: SMB/Windows Admin Shares), T1047 (Windows Management Instrumentation), T1557 (Adversary-in-the-Middle), T1557.001 (Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay)

Security, Sysmon

Microsoft

Windows

RV-D-495

Изменение конфигурации загрузки безопасного режима

TA0005 (Defense Evasion)

T1562.009 (Impair Defenses: Safe Mode Boot)

Security, Sysmon

Microsoft

Windows

RV-D-508

Уничтожение информации на диске в Windows

TA0040 (Impact)

T1561 (Disk Wipe), T1561.001 (Disk Wipe: Disk Content Wipe), T1561.002 (Disk Wipe: Disk Structure Wipe)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-519

Атака Bad USB Windows

TA0001 (Initial Access), TA0002 (Execution)

T1091 (Replication Through Removable Media), T1092 (Communication Through Removable Media), T1200 (Hardware Additions), T1674 (Input Injection)

Security, Sysmon

Microsoft

Windows

RV-D-529

Удаленная эксплуатация DCOM объекта Excel.Application

TA0008 (Lateral Movement)

T1021 (Remote Services), T1021.003 (Remote Services: Distributed Component Object Model)

Security

Microsoft

Windows

RV-D-530

Удаленная отладка браузера Windows

TA0009 (Collection)

T1185 (Browser Session Hijacking), T1539 (Steal Web Session Cookie)

Security, Sysmon

Microsoft

Windows

RV-D-531

Удаление метки MOTW Windows

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.005 (Subvert Trust Controls: Mark-of-the-Web Bypass), T1564 (Hide Artifacts), T1564.004 (Hide Artifacts: NTFS File Attributes)

Sysmon

Microsoft

Windows

RV-D-532

Атака Code Signing Windows

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.002 (Subvert Trust Controls: Code Signing)

Security, Sysmon

Microsoft

Windows

RV-D-533

SIP Hijacking Windows

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.003 (Subvert Trust Controls: SIP and Trust Provider Hijacking)

Security, Sysmon

Microsoft

Windows

RV-D-534

Атака CS Policy Modification

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.002 (Subvert Trust Controls: Code Signing), T1553.006 (Subvert Trust Controls: Code Signing Policy Modification)

Security, Sysmon

Microsoft

Windows

RV-D-535

Обнаружение стеганографии в Windows

TA0011 (Command and Control), TA0005 (Defense Evasion)

T1001 (Data Obfuscation), T1001.002 (Data Obfuscation: Steganography), T1027 (Obfuscated Files or Information), T1027.003 (Obfuscated Files or Information: Steganography)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-537

Извлечение содержимого буфера в Windows

TA0009 (Collection)

T1115 (Clipboard Data)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-539

Поиск учетных данных в групповых политиках

TA0006 (Credential Access)

T1552 (Unsecured Credentials), T1552.006 (Unsecured Credentials: Group Policy Preferences)

Security

Microsoft

Windows

RV-D-540

Создание удаленного потока в процессе Lsass

TA0004 (Privilege Escalation)

T1055 (Process Injection), T1055.003 (Process Injection: Thread Execution Hijacking)

Sysmon

Microsoft

Windows

RV-D-541

Перехват RDP соединения

TA0008 (Lateral Movement)

T1563 (Remote Service Session Hijacking), T1563.002 (Remote Service Session Hijacking: RDP Hijacking)

Security, Sysmon

Microsoft

Windows

RV-D-542

Получение учетных данных из реестра

TA0006 (Credential Access)

T1552 (Unsecured Credentials), T1552.002 (Unsecured Credentials: Credentials in Registry)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-543

Использование утилиты TikiTorch

TA0004 (Privilege Escalation)

T1055 (Process Injection), T1055.003 (Process Injection: Thread Execution Hijacking)

Sysmon

Microsoft

Windows

RV-D-544

Атака Pass the Ticket

TA0005 (Defense Evasion)

T1550 (Use Alternate Authentication Material), T1550.003 (Use Alternate Authentication Material: Pass the Ticket)

Security, Sysmon

Microsoft

Windows

RV-D-545

Атака Pass the Hash

TA0005 (Defense Evasion)

T1550 (Use Alternate Authentication Material), T1550.002 (Use Alternate Authentication Material: Pass the Hash)

Security, Sysmon

Microsoft

Windows

RV-D-573

Обнаружение HTML/SVG Smuggling в Windows

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information), T1027.006 (Obfuscated Files or Information: HTML Smuggling), T1027.017 (Obfuscated Files or Information: SVG Smuggling)

Sysmon

Microsoft

Windows

RV-D-574

Скрытие учетной записи через реестр Windows

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.002 (Hide Artifacts: Hidden Users)

Security, Sysmon

Microsoft

Windows

RV-D-575

Компрометация через KrbRelayUp

TA0004 (Privilege Escalation)

T1068 (Exploitation for Privilege Escalation)

Security, Sysmon

Microsoft

Windows

RV-D-580

Создание подозрительного процесса от hh.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.001 (System Binary Proxy Execution: Compiled HTML File)

Security, Sysmon

Microsoft

Windows

RV-D-581

Изменение прав доступа к файлам

TA0005 (Defense Evasion)

T1222 (File and Directory Permissions Modification), T1222.001 (File and Directory Permissions Modification: Windows File and Directory Permissions Modification)

Security

Microsoft

Windows

RV-D-582

Скачивание удаленного файла средствами hh.exe

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.001 (System Binary Proxy Execution: Compiled HTML File)

Security, Sysmon

Microsoft

Windows

RV-D-595

Загрузка dll-библиотеки средствами mavinject

TA0005 (Defense Evasion)

T1218 (System Binary Proxy Execution), T1218.013 (System Binary Proxy Execution: Mavinject)

Security, Sysmon

Microsoft

Windows

RV-D-596

Запуск множества подозрительных команд

TA0007 (Discovery)

T1018 (Remote System Discovery), T1046 (Network Service Discovery), T1047 (Windows Management Instrumentation), T1049 (System Network Connections Discovery), T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1082 (System Information Discovery), T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1087.002 (Account Discovery: Domain Account), T1124 (System Time Discovery), T1482 (Domain Trust Discovery)

Security, Sysmon

Microsoft

Windows

RV-D-597

Очистка истории команда PowerShell в Windows

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.003 (Indicator Removal: Clear Command History)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-598

Атака Kerberoasting

TA0006 (Credential Access)

T1558 (Steal or Forge Kerberos Tickets), T1558.003 (Steal or Forge Kerberos Tickets: Kerberoasting)

Security, Sysmon

Microsoft

Windows

RV-D-599

Закрепление через Office Template Macros

TA0003 (Persistence), TA0005 (Defense Evasion)

T1112 (Modify Registry), T1137 (Office Application Startup), T1137.001 (Office Application Startup: Office Template Macros)

Sysmon

Microsoft

Windows

RV-D-600

Закрепление через Office Test

TA0003 (Persistence), TA0005 (Defense Evasion)

T1112 (Modify Registry), T1137 (Office Application Startup), T1137.001 (Office Application Startup: Office Template Macros)

Sysmon

Microsoft

Windows

RV-D-601

Закрепление через Outlook Home Page

TA0003 (Persistence)

T1137 (Office Application Startup), T1137.004 (Office Application Startup: Outlook Home Page)

Security, Sysmon

Microsoft

Windows

RV-D-602

Закрепление через Microsoft Office Add-ins

TA0003 (Persistence)

T1137 (Office Application Startup), T1137.006 (Office Application Startup: Add-ins)

Sysmon

Microsoft

Windows

RV-D-603

Обнаружение компиляции исходного кода на Windows

TA0005 (Defense Evasion)

T1027 (Obfuscated Files or Information), T1027.004 (Obfuscated Files or Information: Compile After Delivery)

Security, Sysmon

Microsoft

Windows

RV-D-604

Скрытие файла через attrib.exe

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.001 (Hide Artifacts: Hidden Files and Directories)

Security, Sysmon

Microsoft

Windows

RV-D-605

Запуск PowerShell окна в скрытом режиме

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.003 (Hide Artifacts: Hidden Window)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-606

Сокрытие данных в атрибутах файлов NTFS

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.004 (Hide Artifacts: NTFS File Attributes)

Sysmon, PowerShell

Microsoft

Windows

RV-D-607

Удаление временных RDP файлов в Windows

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.007 (Indicator Removal: Clear Network Connection History and Configurations)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-608

Удаление истории RDP подключений через реестр

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.007 (Indicator Removal: Clear Network Connection History and Configurations)

Security, Sysmon

Microsoft

Windows

RV-D-617

Запуск MSBuild для выполнения кода

TA0005 (Defense Evasion)

T1127 (Trusted Developer Utilities Proxy Execution), T1127.001 (Trusted Developer Utilities Proxy Execution: MSBuild)

Security, Sysmon

Microsoft

Windows

RV-D-628

Изменение атрибута для скрытия файла через PowerShell

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.001 (Hide Artifacts: Hidden Files and Directories)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-629

Удаленная эксплуатация DCOM объекта IMsiServer

TA0008 (Lateral Movement), TA0005 (Defense Evasion)

T1021 (Remote Services), T1021.003 (Remote Services: Distributed Component Object Model), T1218 (System Binary Proxy Execution), T1218.007 (System Binary Proxy Execution: Msiexec)

Sysmon

Microsoft

Windows

RV-D-631

Создание токена и имперсонация учетной записи

TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1134 (Access Token Manipulation), T1134.002 (Access Token Manipulation: Create Process with Token)

Sysmon

Microsoft

Windows

RV-D-648

Остановка критичных сервисов

TA0040 (Impact)

T1489 (Service Stop)

System

Microsoft

Windows

RV-D-659

Запуск процесса от другого пользователя

TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1134 (Access Token Manipulation), T1134.002 (Access Token Manipulation: Create Process with Token)

Security, Sysmon

Microsoft

Windows

RV-D-660

Подмена PID родительского процесса

TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1134 (Access Token Manipulation), T1134.004 (Access Token Manipulation: Parent PID Spoofing)

Sysmon

Microsoft

Windows

RV-D-661

Изменение SID-History

TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1134 (Access Token Manipulation), T1134.005 (Access Token Manipulation: SID-History Injection)

Security

Microsoft

Windows

RV-D-662

Эксплуатация Mark-of-the-Web bypass

TA0005 (Defense Evasion)

T1553 (Subvert Trust Controls), T1553.005 (Subvert Trust Controls: Mark-of-the-Web Bypass)

Sysmon

Microsoft

Windows

RV-D-663

Удаленное выполнение команд с помощью PsExec

TA0003 (Persistence), TA0008 (Lateral Movement), TA0002 (Execution)

T1021 (Remote Services), T1021.002 (Remote Services: SMB/Windows Admin Shares), T1543 (Create or Modify System Process), T1543.003 (Create or Modify System Process: Windows Service), T1569 (System Services), T1569.002 (System Services: Service Execution), T1570 (Lateral Tool Transfer)

Security

Microsoft

Windows

RV-D-678

Добавление расширения в браузер средством CLI

TA0003 (Persistence)

T1176 (Software Extensions), T1176.001 (Software Extensions: Browser Extensions)

Security, Sysmon

Microsoft

Windows

RV-D-687

Добавление файла в директорию расширения браузера

TA0003 (Persistence)

T1176 (Software Extensions), T1176.001 (Software Extensions: Browser Extensions)

Security, Sysmon

Microsoft

Windows

RV-D-713

Утечка NTLM через library-ms (CVE-2025-24071)

TA0006 (Credential Access)

T1187 (Forced Authentication), T1557 (Adversary-in-the-Middle), T1557.001 (Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay)

Sysmon

Microsoft

Windows

RV-D-715

Использование средств виртуализации

TA0005 (Defense Evasion)

T1564 (Hide Artifacts), T1564.006 (Hide Artifacts: Run Virtual Instance)

PowerShell, Security, Sysmon

Microsoft

Windows

RV-D-725

Сжатие файлов средствами PowerShell

TA0009 (Collection)

T1560 (Archive Collected Data), T1560.001 (Archive Collected Data: Archive via Utility)

PowerShell

Microsoft

Windows

RV-D-726

Прямой доступ к диску через PowerShell

TA0005 (Defense Evasion)

T1006 (Direct Volume Access)

PowerShell

Microsoft

Windows

RV-D-727

Изменение доверительных отношений между доменами

TA0005 (Defense Evasion), TA0004 (Privilege Escalation)

T1484 (Domain or Tenant Policy Modification), T1484.002 (Domain or Tenant Policy Modification: Trust Modification)

Security

Microsoft

Windows

RV-D-728

Обнаружение эксплуатации DDE через Office

TA0002 (Execution)

T1559 (Inter-Process Communication), T1559.002 (Inter-Process Communication: Dynamic Data Exchange)

Sysmon

Microsoft

Windows

RV-D-729

Обход UAC через COM-объекты

TA0002 (Execution), TA0004 (Privilege Escalation), TA0005 (Defense Evasion)

T1548 (Abuse Elevation Control Mechanism), T1548.002 (Abuse Elevation Control Mechanism: Bypass User Account Control), T1559 (Inter-Process Communication), T1559.001 (Inter-Process Communication: Component Object Model)

Sysmon

Microsoft

Windows

RV-D-731

Использование ssh.exe для кражи NTLM-хэша

TA0006 (Credential Access)

T1187 (Forced Authentication)

Security, Sysmon

Microsoft

Windows

RV-D-732

Запуск ssh.exe с подозрительными параметрами

TA0005 (Defense Evasion)

T1202 (Indirect Command Execution), T1218 (System Binary Proxy Execution)

Security, Sysmon

Microsoft

Windows

RV-D-733

Создание обратного туннеля через ssh.exe

TA0011 (Command and Control)

T1572 (Protocol Tunneling)

Security, Sysmon

Microsoft

Windows

RV-D-739

Подозрительные DNS-запросы к localtoNet домену

TA0011 (Command and Control)

T1572 (Protocol Tunneling)

Sysmon

Microsoft

Windows

RV-D-759

Эксфильтрация данных через finger.exe

TA0010 (Exfiltration), TA0011 (Command and Control)

T1048 (Exfiltration Over Alternative Protocol), T1048.003 (Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol), T1105 (Ingress Tool Transfer)

Security, Sysmon

Microsoft

Windows

RV-D-764

Эксплуатация утилиты LaZagne

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.001 (OS Credential Dumping: LSASS Memory), T1003.004 (OS Credential Dumping: LSA Secrets), T1003.005 (OS Credential Dumping: Cached Domain Credentials), T1552 (Unsecured Credentials), T1552.001 (Unsecured Credentials: Credentials In Files), T1555 (Credentials from Password Stores), T1555.001 (Credentials from Password Stores: Keychain), T1555.003 (Credentials from Password Stores: Credentials from Web Browsers), T1555.004 (Credentials from Password Stores: Windows Credential Manager)

Sysmon

Microsoft

Windows

RV-D-767

Создание дампа NTDS.dit

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.003(OS Credential Dumping: NTDS)

Sysmon

OpenVPN

OpenVPN Access Server

RV-D-670

Подключение OpenVPN за пределами России

TA0001 (Initial Access)

T1078 (Valid Accounts), T1133 (External Remote Services)

OpenVPN Access Server

OpenVPN

OpenVPN Access Server

RV-D-671

Подбор пароля в веб-консоль OpenVPN AS

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

OpenVPN Access Server

OpenVPN

OpenVPN Access Server

RV-D-672

Успешный подбор пароля клиента OpenVPN

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

OpenVPN Access Server

OpenVPN

OpenVPN Access Server

RV-D-673

Подбор пароля клиента OpenVPN

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

OpenVPN Access Server

OpenVPN

OpenVPN Access Server

RV-D-674

Аномальный HTTP-запрос к webUI Access Server

TA0001 (Initial Access)

T1078 (Valid Accounts), T1133 (External Remote Services)

OpenVPN Access Server

OpenVPN

OpenVPN Access Server

RV-D-675

Множество неуспешных HTTP-запросов к OpenVPN AS

TA0043 (Reconnaissance)

T1190 (Exploit Public-Facing Application), T1595.003 (Active Scanning: Wordlist Scanning)

OpenVPN Access Server

OpenVPN

OpenVPN Access Server

RV-D-676

Доступ к файлу с ключами и сертификатами OpenVPN

TA0009 (Collection)

T1074 (Data Staged), T1587 (Develop Capabilities), T1587.003 (Develop Capabilities: Digital Certificates), T1588 (Obtain Capabilities), T1588.004 (Obtain Capabilities: Digital Certificates)

Auditd

OpenVPN

OpenVPN Access Server

RV-D-677

Изменение конфигурации OpenVPN Access Server

TA0005 (Defense Evasion)

T1562 (Impair Defenses)

Auditd

Oracle

MySQL

RV-D-512

Вход привилегированного пользователя в MySQL

TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

percona-audit

Oracle

MySQL

RV-D-513

Атака Password Spraying на СУБД MySQL

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

percona-audit

Oracle

MySQL

RV-D-514

Успешный подбор пароля к СУБД MySQL

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

percona-audit

Oracle

MySQL

RV-D-515

Подбор пароля к СУБД MySQL

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

percona-audit

Oracle

MySQL

RV-D-741

Назначение прав администратора MySQL

TA0004 (Privilege Escalation), TA0003 (Persistence)

T1098 (Account Manipulation)

percona-audit

Oracle

MySQL

RV-D-742

Просмотр пользовательских данных MySQL

TA0007 (Discovery), TA0006 (Credential Access), TA0009 (Collection)

T1003 (OS Credential Dumping), T1003.007 (OS Credential Dumping: Proc Filesystem), T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1087.002 (Account Discovery: Domain Account), T1213 (Data from Information Repositories)

percona-audit

Oracle

MySQL

RV-D-743

Массовое удаление таблиц MySQL

TA0040 (Impact)

T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

percona-audit

Oracle

MySQL

RV-D-744

Остановка сессии пользователя в MySQL

TA0040 (Impact)

T1531 (Account Access Removal)

percona-audit

Oracle

MySQL

RV-D-745

Удаление базы данных в MySQL

TA0040 (Impact)

T1485 (Data Destruction)

percona-audit

Oracle

MySQL

RV-D-746

Создание резервной копии MySQL

TA0006 (Credential Access), TA0009 (Collection)

T1003 (OS Credential Dumping), T1005 (Data from Local System), T1074 (Data Staged), T1074.001 (Data Staged: Local Data Staging)

percona-audit, Auditd

Oracle

MySQL

RV-D-747

Изменение\удаление таблицы аудита MySQL

TA0005 (Defense Evasion), TA0040 (Impact)

T1070 (Indicator Removal), T1070.001 (Indicator Removal: Clear Windows Event Logs), T1562.001 (Impair Defenses: Disable or Modify Tools), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

percona-audit

Oracle

MySQL

RV-D-748

Изменение пароля учетной записи MySQL

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation)

percona-audit

Oracle

MySQL

RV-D-749

Получение списка подключений к MySQL

TA0007 (Discovery)

T1049 (System Network Connections Discovery)

percona-audit

Oracle

MySQL

RV-D-750

Получение информации о версии MySQL

TA0007 (Discovery)

T1518 (Software Discovery)

percona-audit

Oracle

Oracle Database

RV-D-709

Атака Password Spraying на OracleDB

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

-

Oracle

Oracle Database

RV-D-710

Подбор пароля к СУБД Oracle

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

Oracle

Oracle Database

RV-D-711

Манипуляция с учетными данными СУБД Oracle

TA0003 (Persistence)

T1098 (Account Manipulation)

-

Oracle

Oracle Database

RV-D-712

Получение информации о пользователях СУБД Oracle

TA0007 (Discovery)

T1033 (System Owner/User Discovery)

-

Oracle

Oracle Database

RV-D-714

Экспорт базы данных Oracle

TA0010 (Exfiltration)

T1020 (Automated Exfiltration)

Auditd

Oracle

Oracle Database

RV-D-719

Успешный подбор пароля к СУБД Oracle

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

Oracle

Oracle Database

RV-D-720

Вход привилегированного пользователя в СУБД Oracle

TA0001 (Initial Access)

T1078 (Valid Accounts)

-

Oracle

Oracle Database

RV-D-721

Поиск информации о структуре в OracleDB

TA0007 (Discovery)

T1082 (System Information Discovery)

-

Oracle

Oracle Database

RV-D-722

Поиск информации о конфигурации OracleDB

TA0007 (Discovery)

T1082 (System Information Discovery)

-

Positive Technologies

Network Attack Discovery

RV-D-618

Запрос на репликацию от недоверенного DNS-сервера

TA0043 (Reconnaissance)

T1071 (Application Layer Protocol), T1071.004 (Application Layer Protocol: DNS), T1590 (Gather Victim Network Information), T1590.002 (Gather Victim Network Information: DNS)

-

Positive Technologies

Network Attack Discovery

RV-D-619

Попытки получения информации об учетных записях

TA0007 (Discovery)

T1087 (Account Discovery), T1087.002 (Account Discovery: Domain Account)

-

Positive Technologies

Network Attack Discovery

RV-D-620

Обнаружены признаки использования вредоносной утилиты

TA0011 (Command and Control)

T1008 (Fallback Channels), T1021 (Remote Services), T1021.001 (Remote Services: Remote Desktop Protocol), T1029 (Scheduled Transfer), T1071 (Application Layer Protocol), T1071.001 (Application Layer Protocol: Web Protocols), T1071.002 (Application Layer Protocol: File Transfer Protocols), T1090 (Proxy), T1090.001 (Proxy: Internal Proxy), T1090.003 (Proxy: Multi-hop Proxy), T1102 (Web Service), T1102.003 (Web Service: One-Way Communication), T1104 (Multi-Stage Channels), T1132 (Data Encoding), T1529 (System Shutdown/Reboot), T1550 (Use Alternate Authentication Material), T1573 (Encrypted Channel), T1573.002 (Encrypted Channel: Asymmetric Cryptography), T1665 (Hide Infrastructure)

-

Positive Technologies

Network Attack Discovery

RV-D-621

Обнаружена попытка эксплуатации уязвимости

TA0001 (Initial Access)

T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution)

-

Positive Technologies

Network Attack Discovery

RV-D-622

Атака DCSync

TA0006 (Credential Access)

T1003 (OS Credential Dumping), T1003.006 (OS Credential Dumping: DCSync)

-

Positive Technologies

Network Attack Discovery

RV-D-623

Атака DCShadow

TA0005 (Defense Evasion)

T1207 (Rogue Domain Controller)

-

Positive Technologies

Network Attack Discovery

RV-D-624

Подозрительная сетевая активность с одного узла

TA0002 (Execution)

T1203 (Exploitation for Client Execution)

-

Positive Technologies

Network Attack Discovery

RV-D-625

Обнаружен индикатор компрометации - IOC

TA0011 (Command and Control)

T1071 (Application Layer Protocol)

-

Positive Technologies

Network Attack Discovery

RV-D-626

Подозрительная сетевая активность с нескольких узлов

TA0002 (Execution)

T1203 (Exploitation for Client Execution)

-

Positive Technologies

Network Attack Discovery

RV-D-627

Признаки использования утилиты для туннелирования трафика

TA0011 (Command and Control)

T1572 (Protocol Tunneling)

-

Positive Technologies

PT Application Firewall 3

RV-D-560

Доступ к странице без информации браузера

TA0009 (Collection), TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1119 (Automated Collection), T1589 (Gather Victim Identity Information), T1589.002 (Gather Victim Identity Information: Email Addresses), T1589.003 (Gather Victim Identity Information: Employee Names)

-

Positive Technologies

PT Application Firewall 3

RV-D-561

Использование устаревшего протокола

TA0005 (Defense Evasion)

T1562.010 (Impair Defenses: Downgrade Attack), T1595 (Active Scanning), T1595.002 (Active Scanning: Vulnerability Scanning)

-

Positive Technologies

PT Application Firewall 3

RV-D-562

Атака с отраженной загрузкой файла

TA0001 (Initial Access), TA0011 (Command and Control)

T1105 (Ingress Tool Transfer), T1189 (Drive-by Compromise), T1190 (Exploit Public-Facing Application), T1598 (Phishing for Information), T1598.003 (Phishing for Information: Spearphishing Link)

-

Positive Technologies

PT Application Firewall 3

RV-D-563

Атака на веб-ресурс PT AF

TA0001 (Initial Access), TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.006 (Command and Scripting Interpreter: Python), T1190 (Exploit Public-Facing Application), T1505 (Server Software Component), T1505.003 (Server Software Component: Web Shell)

-

Positive Technologies

PT Application Firewall 3

RV-D-564

Попытка эксплуатации уязвимостей

TA0001 (Initial Access)

T1190 (Exploit Public-Facing Application)

-

Positive Technologies

PT Application Firewall 3

RV-D-565

Потенциальный перебор страниц web-ресурса

TA0043 (Reconnaissance)

T1595 (Active Scanning), T1595.003 (Active Scanning: Wordlist Scanning)

-

Positive Technologies

PT Application Firewall 3

RV-D-566

Поиск артефактов веб-приложения

TA0043 (Reconnaissance)

T1595 (Active Scanning), T1595.003 (Active Scanning: Wordlist Scanning)

-

Positive Technologies

PT Application Firewall 3

RV-D-567

Обнаружена атака типа Brute Force

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

-

Positive Technologies

PT Application Firewall 3

RV-D-568

Подбор пароля к форме авторизации

TA0006 (Credential Access)

T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing), T1110.003 (Brute Force: Password Spraying)

-

Positive Technologies

PT Application Firewall 3

RV-D-569

Множество атак на веб-ресурс

TA0001 (Initial Access), TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.006 (Command and Scripting Interpreter: Python), T1190 (Exploit Public-Facing Application), T1505 (Server Software Component), T1505.003 (Server Software Component: Web Shell)

-

Positive Technologies

PT Application Firewall 3

RV-D-570

Атака на различные веб-ресурсы

TA0001 (Initial Access), TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.001 (Command and Scripting Interpreter: PowerShell), T1059.003 (Command and Scripting Interpreter: Windows Command Shell), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.006 (Command and Scripting Interpreter: Python), T1190 (Exploit Public-Facing Application), T1505 (Server Software Component), T1505.003 (Server Software Component: Web Shell)

-

Positive Technologies

PT Application Firewall 3

RV-D-571

Использование сканера уязвимостей

TA0001 (Initial Access), TA0043 (Reconnaissance)

T1190 (Exploit Public-Facing Application), T1595 (Active Scanning), T1595.002 (Active Scanning: Vulnerability Scanning)

-

PostgreSQL

PostgreSQL

RV-D-182

Множественные неудачные попытки подключения к базе данных PostgreSQL

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

pgAudit

PostgreSQL

PostgreSQL

RV-D-183

Обнаружена попытка дампа базы данных или учетных данных PostgreSQL

TA0006 (Credential Access)

T1003 (OS Credential Dumping)

Auditd, pgAudit

PostgreSQL

PostgreSQL

RV-D-184

Атака типа Password Spraying к СУБД PostgreSQL

TA0006 (Credential Access)

T1110 (Brute Force), T1110.002 (Brute Force: Password Cracking)

pgAudit

PostgreSQL

PostgreSQL

RV-D-185

Успешная атака типа Brute Force к СУБД PostgreSQL

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

pgAudit

PostgreSQL

PostgreSQL

RV-D-186

Обнаружено изменение параметров аудита базы данных PostgreSQL

TA0005 (Defense Evasion)

T1562 (Impair Defenses)

pgAudit

PostgreSQL

PostgreSQL

RV-D-187

Возможно, предпринята попытка разведки структуры базы данных PostgreSQL

TA0007 (Discovery)

T1082 (System Information Discovery)

pgAudit

PostgreSQL

PostgreSQL

RV-D-188

Взаимодействие с файловой системой из базы данных PostgreSQL

TA0007 (Discovery)

T1083 (File and Directory Discovery)

pgAudit

PostgreSQL

PostgreSQL

RV-D-189

Получение информации о существующих учетных записях в PostgreSQL

TA0007 (Discovery)

T1087 (Account Discovery)

pgAudit

PostgreSQL

PostgreSQL

RV-D-190

Изменение файла конфигурации базы данных PostgreSQL

TA0040 (Impact)

T1565 (Data Manipulation)

Auditd

PostgreSQL

PostgreSQL

RV-D-191

Попытка удаления базы данных в PostgreSQL

TA0040 (Impact)

T1485 (Data Destruction)

pgAudit

PostgreSQL

PostgreSQL

RV-D-192

Вход привилегированного пользователя на СУБД PostgreSQL с неизвестного хоста

TA0003 (Persistence), TA0005 (Defense Evasion)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

pgAudit

PostgreSQL

PostgreSQL

RV-D-193

Новая учетная запись с правами superuser в PostgreSQL

TA0003 (Persistence)

T1136 (Create Account)

pgAudit

PostgreSQL

PostgreSQL

RV-D-194

Изменен пароль от учетной записи с правами superuser в PostgreSQL

TA0003 (Persistence), TA0004 (Privilege Escalation)

T1098 (Account Manipulation)

pgAudit

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-195

Подбор пароля к СУБД Redis

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Events of database

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-196

Атака Password Spraying на Redis

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying)

Events of database

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-197

Успешный подбор пароля к Redis

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

Events of database

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-198

Вход привилегированного пользователя в Redis

TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

Events of database

Redis

Redis Enterprise Software

RV-D-583

Добавление нового модуля в кластер Redis

TA0002 (Execution), TA0008 (Lateral Movement)

T1072 (Software Deployment Tools)

Redis Enterprise Software

Redis

Redis Enterprise Software

RV-D-590

Создание критичной роли в кластере Redis

TA0004 (Privilege Escalation), TA0003 (Persistence)

T1098 (Account Manipulation)

Redis Enterprise Software

Redis

Redis Enterprise Software

RV-D-591

Удаление экземпляра БД Redis

TA0040 (Impact)

T1485 (Data Destruction), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

Redis Enterprise Software

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-592

Создание нового пользователя Redis

TA0003 (Persistence)

T1136 (Create Account), T1136.001 (Create Account: Local Account)

Redis Enterprise Software, Redis Monitor

Redis

Redis Enterprise Software

RV-D-594

Добавление критичной роли пользователю Redis

TA0004 (Privilege Escalation), TA0003 (Persistence)

T1098 (Account Manipulation)

Redis Enterprise Software

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-584

Очистка экземпляра базы данных Redis

TA0040 (Impact)

T1485 (Data Destruction), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

Redis Monitor

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-585

Множественное удаление данных в экземпляре Redis БД

TA0040 (Impact)

T1485 (Data Destruction), T1565 (Data Manipulation), T1565.001 (Data Manipulation: Stored Data Manipulation)

Redis Monitor

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-586

Дамп экземпляра базы данных Redis

TA0009 (Collection)

T1005 (Data from Local System)

Redis Monitor

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-587

Получение информации об экземпляре базы данных Redis

TA0007 (Discovery)

T1082 (System Information Discovery)

Redis Monitor

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-588

Получение информации о существующих пользователях Redis БД

TA0007 (Discovery)

T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account)

Redis Monitor

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-589

Получение информации о существующих ключах в экземпляре БД Redis

TA0007 (Discovery)

T1082 (System Information Discovery)

Redis Monitor

Redis

Redis Community Edition, Redis Enterprise Software

RV-D-593

Изменение конфигурации экземпляра базы данных Redis

TA0005 (Defense Evasion), TA0040 (Impact)

T1562.001 (Impair Defenses: Disable or Modify Tools), T1565 (Data Manipulation)

Redis Monitor

Usergate

Usergate NGFW

RV-D-208

Соединение с адресом из репутационного списка

TA0011 (Command and Control)

T1102 (Web Service)

-

Usergate

Usergate NGFW

RV-D-209

Соединение с веб-ресурсом с высоким уровнем критичности

TA0011 (Command and Control)

T1102 (Web Service)

-

Usergate

Usergate NGFW

RV-D-210

Соединение с веб-ресурсом с низким уровнем критичности

TA0011 (Command and Control)

T1102 (Web Service)

-

VMware

VMware ESXi

RV-D-226

Изменение аудита виртуальной инфраструктуры

TA0040 (Impact), TA0005 (Defense Evasion)

T1485 (Data Destruction)

hostd.log

VMware

VMware ESXi

RV-D-679

Остановка критичного сервиса ESXi

TA0040 (Impact)

T1489 (Service Stop)

shell.log

VMware

VMware ESXi

RV-D-680

Создание ssh-туннелей на ESXi

TA0011 (Command and Control), TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1090 (Proxy), T1572 (Protocol Tunneling)

shell.log

VMware

VMware ESXi

RV-D-681

Использование find в ESXi

TA0002 (Execution), TA0007 (Discovery), TA0009 (Collection)

T1005 (Data from Local System), T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1070 (Indicator Removal), T1070.004 (Indicator Removal: File Deletion), T1083 (File and Directory Discovery)

shell.log

VMware

VMware ESXi

RV-D-682

Использование утилит ESXi через CLI

TA0002 (Execution), TA0003 (Persistence), TA0005 (Defense Evasion), TA0007 (Discovery), TA0008 (Lateral Movement), TA0040 (Impact)

T1016 (System Network Configuration Discovery), T1018 (Remote System Discovery), T1021 (Remote Services), T1021.004 (Remote Services: SSH), T1049 (System Network Connections Discovery), T1057 (Process Discovery), T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1059.012 (Command and Scripting Interpreter: Hypervisor CLI), T1070 (Indicator Removal), T1070.009 (Indicator Removal: Clear Persistence), T1082 (System Information Discovery), T1087 (Account Discovery), T1087.001 (Account Discovery: Local Account), T1124 (System Time Discovery), T1136 (Create Account), T1136.001 (Create Account: Local Account), T1485 (Data Destruction), T1489 (Service Stop), T1490 (Inhibit System Recovery), T1505 (Server Software Component), T1505.006 (Server Software Component: vSphere Installation Bundles), T1518 (Software Discovery), T1529 (System Shutdown/Reboot), T1561 (Disk Wipe), T1562.001 (Impair Defenses: Disable or Modify Tools), T1562.004 (Impair Defenses: Disable or Modify System Firewall), T1562.006 (Impair Defenses: Indicator Blocking), T1564 (Hide Artifacts), T1564.006 (Hide Artifacts: Run Virtual Instance), T1673 (Virtual Machine Discovery)

shell.log

VMware

VMware ESXi

RV-D-696

Обнаружение уязвимой конфигурации ESXi

TA0002 (Execution), TA0008 (Lateral Movement), TA0001 (Initial Access), TA0005 (Defense Evasion)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1190 (Exploit Public-Facing Application), T1210 (Exploitation of Remote Services), T1562.004 (Impair Defenses: Disable or Modify System Firewall), T1569 (System Services)

shell.log, hostd.log, vobd.log, slpd.log

VMware

VMware ESXi

RV-D-718

Использование chmod в ESXi через CLI

TA0005 (Defense Evasion), TA0002 (Execution)

T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell), T1222 (File and Directory Permissions Modification), T1222.002 (File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification)

shell.log

VMware

VMware ESXi

RV-D-753

Удаление или отключение логирования команд

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.003 (Indicator Removal: Clear Command History), T1562.003 (Impair Defenses: Impair Command History Logging)

shell.log

VMware

VMware ESXi

RV-D-754

Доступ к критичным файлам на сервере ESXi

TA0002 (Execution), TA0003 (Persistence)

T1037 (Boot or Logon Initialization Scripts), T1037.004 (Boot or Logon Initialization Scripts: RC Scripts), T1053 (Scheduled Task/Job), T1053.003 (Scheduled Task/Job: Cron), T1059 (Command and Scripting Interpreter), T1059.004 (Command and Scripting Interpreter: Unix Shell)

shell.log

VMware

VMware ESXi

RV-D-760

Маскировка через переименование/подмену index.html

TA0005 (Defense Evasion)

T1036 (Masquerading), T1036.005 (Masquerading: Match Legitimate Resource Name or Location)

shell.log

VMware

VMware ESXi

RV-D-761

Изменение меток времени через touch

TA0005 (Defense Evasion)

T1070 (Indicator Removal), T1070.006 (Indicator Removal: Timestomp)

shell.log

VMware

VMware ESXi

RV-D-765

Лишение пользователя доступа к ESXi

TA0040 (Impact)

T1531 (Account Access Removal)

hostd.log

VMware

VMware ESXi, VMware vCenter

RV-D-211

Множественные неуспешные попытки аутентификации пользователя

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-214

Выгрузка файла с критичной виртуальной машины

TA0006 (Credential Access)

T1003 (OS Credential Dumping)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-215

Выгрузка нескольких файлов с критичной виртуальной машины

TA0006 (Credential Access), TA0009 (Collection)

T1003 (OS Credential Dumping), T1119 (Automated Collection)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-216

Обнаружение атаки Password Spraying

TA0006 (Credential Access)

T1110 (Brute Force), T1110.003 (Brute Force: Password Spraying), T1110.004 (Brute Force: Credential Stuffing)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-217

Возможно успешный подбор пароля пользователя на VMware

TA0006 (Credential Access)

T1110 (Brute Force), T1110.001 (Brute Force: Password Guessing)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-218

Изменение конфигурации критичной виртуальной машины

TA0040 (Impact), TA0011 (Command and Control), TA0005 (Defense Evasion)

T1095 (Non-Application Layer Protocol), T1485 (Data Destruction), T1565 (Data Manipulation), T1565.003 (Data Manipulation: Runtime Data Manipulation)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-219

Изменение конфигурации нескольких критичных виртуальных машин

TA0040 (Impact), TA0011 (Command and Control), TA0005 (Defense Evasion)

T1095 (Non-Application Layer Protocol), T1485 (Data Destruction), T1485.001 (Data Destruction: Lifecycle-Triggered Deletion), T1565 (Data Manipulation), T1565.003 (Data Manipulation: Runtime Data Manipulation)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-223

Создание множества виртуальных машин

TA0040 (Impact), TA0005 (Defense Evasion)

T1485 (Data Destruction), T1499 (Endpoint Denial of Service), T1499.001 (Endpoint Denial of Service: OS Exhaustion Flood), T1564 (Hide Artifacts), T1564.006 (Hide Artifacts: Run Virtual Instance)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-224

Отключена критичная виртуальная машина

TA0040 (Impact), TA0005 (Defense Evasion)

T1485 (Data Destruction), T1529 (System Shutdown/Reboot)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-225

Отключено несколько критичных виртуальных машин

TA0040 (Impact), TA0005 (Defense Evasion)

T1485 (Data Destruction), T1529 (System Shutdown/Reboot)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-227

Удалена критичная виртуальная машина

TA0040 (Impact)

T1485 (Data Destruction)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-228

Удалено несколько критичных виртуальных машин

TA0040 (Impact)

T1485 (Data Destruction)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-229

Вход под привилегированной учетной записью с неизвестного хоста

TA0001 (Initial Access)

T1078 (Valid Accounts), T1078.003 (Valid Accounts: Local Accounts)

vpxd.log

VMware

VMware ESXi, VMware vCenter

RV-D-769

Вызов и выполнение Guest API в гостевой ОС

TA0002 (Execution)

T1675 (ESXi Administration Command)

vpxd.log,hostd.log

VMware

VMware vCenter

RV-D-212

Клонирование критичной виртуальной машины

TA0006 (Credential Access), TA0004 (Privilege Escalation), TA0003 (Persistence)

T1003 (OS Credential Dumping)

vpxd.log

VMware

VMware vCenter

RV-D-213

Клонирование нескольких критичных виртуальных машин

TA0006 (Credential Access), TA0004 (Privilege Escalation), TA0003 (Persistence)

T1003 (OS Credential Dumping)

vpxd.log

VMware

VMware vCenter

RV-D-220

Эксплуатация уязвимости CVE-2021-22005 на сервере vCenter

TA0002 (Execution), TA0008 (Lateral Movement), TA0001 (Initial Access)

T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution), T1210 (Exploitation of Remote Services)

Auditd

VMware

VMware vCenter

RV-D-221

Эксплуатация уязвимости CVE-2021-21972 на сервере vCenter

TA0001 (Initial Access), TA0002 (Execution), TA0008 (Lateral Movement), TA0011 (Command and Control)

T1071 (Application Layer Protocol), T1071.001 (Application Layer Protocol: Web Protocols), T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution), T1210 (Exploitation of Remote Services)

Auditd, access.log

VMware

VMware vCenter

RV-D-222

Доступ к критичным файлам на сервере vCenter

TA0001 (Initial Access), TA0008 (Lateral Movement), TA0006 (Credential Access), TA0002 (Execution), TA0003 (Persistence)

T1037 (Boot or Logon Initialization Scripts), T1037.004 (Boot or Logon Initialization Scripts: RC Scripts), T1053 (Scheduled Task/Job), T1053.003 (Scheduled Task/Job: Cron), T1078 (Valid Accounts), T1078.001 (Valid Accounts: Default Accounts), T1110 (Brute Force), T1110.002 (Brute Force: Password Cracking), T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution), T1210 (Exploitation of Remote Services), T1212 (Exploitation for Credential Access), T1555 (Credentials from Password Stores)

Auditd