Files
hayabusa/rules/Sigma/win_usb_device_plugged.yml
2021-11-14 11:00:56 +09:00

30 lines
834 B
YAML

title: USB Device Plugged
author: Florian Roth
date: 2017/11/09
description: Detects plugged USB devices
detection:
SELECTION_1:
EventID: 2003
SELECTION_2:
EventID: 2100
SELECTION_3:
EventID: 2102
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3)
falsepositives:
- Legitimate administrative activity
id: 1a4bd6e3-4c6e-405d-a9a3-53a116e341d4
level: low
logsource:
product: windows
service: driver-framework
references:
- https://df-stream.com/2014/01/the-windows-7-event-log-and-usb-device/
- https://www.techrepublic.com/article/how-to-track-down-usb-flash-drive-usage-in-windows-10s-event-viewer/
status: experimental
tags:
- attack.initial_access
- attack.t1200
yml_filename: win_usb_device_plugged.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/builtin