Detectionmediumtest
Bitbucket User Details Export Attempt Detected
Detects user data export activity.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
bitbucketaudit
Productbitbucket← raw: bitbucket
Serviceaudit← raw: audit
Definition
Requirements: "Advance" log level is required to receive these audit events.
Detection Logic
Detection Logic1 selector
detection:
selection:
auditType.category: 'Users and groups'
auditType.action:
- 'User permissions export failed'
- 'User permissions export started'
- 'User permissions exported'
condition: selectionFalse Positives
Legitimate user activity.
MITRE ATT&CK
Rule Metadata
Rule ID
5259cbf2-0a75-48bf-b57a-c54d6fabaef3
Status
test
Level
medium
Type
Detection
Created
Sun Feb 25
Author
Path
rules/application/bitbucket/audit/bitbucket_audit_user_details_export_attempt_detected.yml
Raw Tags
attack.collectionattack.reconnaissanceattack.discoveryattack.t1213attack.t1082attack.t1591.004