Bitbucket User Details Export Attempt Detected
Detects user data export activity.
Sigma rule (View on GitHub)
1title: Bitbucket User Details Export Attempt Detected
2id: 5259cbf2-0a75-48bf-b57a-c54d6fabaef3
3status: experimental
4description: Detects user data export activity.
5references:
6 - https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
7 - https://support.atlassian.com/security-and-access-policies/docs/export-user-accounts
8author: Muhammad Faisal (@faisalusuf)
9date: 2024-02-25
10tags:
11 - attack.collection
12 - attack.reconnaissance
13 - attack.discovery
14 - attack.t1213
15 - attack.t1082
16 - attack.t1591.004
17logsource:
18 product: bitbucket
19 service: audit
20 definition: 'Requirements: "Advance" log level is required to receive these audit events.'
21detection:
22 selection:
23 auditType.category: 'Users and groups'
24 auditType.action:
25 - 'User permissions export failed'
26 - 'User permissions export started'
27 - 'User permissions exported'
28 condition: selection
29falsepositives:
30 - Legitimate user activity.
31level: medium
References
Related rules
- Bitbucket User Permissions Export Attempt
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- Cisco Collect Data
- Cisco Discovery