SigmaHQ/rules/windows/builtin/win_external_device.yml

26 lines
651 B
YAML
Raw Normal View History

2019-11-20 22:07:29 +00:00
title: External Disk Drive or USB Storage Device
id: f69a87ea-955e-4fb4-adb2-bb9fd6685632
2019-11-20 22:19:45 +00:00
description: Detects external diskdrives or plugged in USB devices
2019-11-20 22:07:29 +00:00
status: experimental
author: Keith Wright
2019-11-20 22:18:03 +00:00
date: 2019/11/20
tags:
- attack.t1091
- attack.t1200
- attack.lateral_movement
- attack.initial_access
2019-11-20 22:07:29 +00:00
logsource:
product: windows
service: security
detection:
selection:
EventID:
- 6416
DeviceClassName: 'DiskDrive'
selection2:
DeviceDescription: 'USB Mass Storage Device'
condition: selection or selection2
falsepositives:
- Legitimate administrative activity
level: low