Files
hayabusa/rules/sigma/builtin/win_usb_device_plugged.yml
DustInDark 0cfa806baf Feature/addruletype to sigma rule#230 (#235)
* added ruletype to SIGMA rule #230

* added ruletype to SIGMA rule converter tool #231
2021-11-28 18:14:51 +09:00

29 lines
710 B
YAML

title: USB Device Plugged
author: Florian Roth
date: 2017/11/09
description: Detects plugged USB devices
detection:
SELECTION_1:
EventID: 2003
SELECTION_2:
EventID: 2100
SELECTION_3:
EventID: 2102
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3)
falsepositives:
- Legitimate administrative activity
id: 1a4bd6e3-4c6e-405d-a9a3-53a116e341d4
level: low
logsource:
product: windows
service: driver-framework
references:
- https://df-stream.com/2014/01/the-windows-7-event-log-and-usb-device/
- https://www.techrepublic.com/article/how-to-track-down-usb-flash-drive-usage-in-windows-10s-event-viewer/
status: experimental
tags:
- attack.initial_access
- attack.t1200
ruletype: SIGMA