Hayabusa

Analyzing Local Windows Event Logs with Hayabusa

This guide shows how to use Hayabusa to scan local Windows Event Logs for threats and view the results in Timeline Explorer.

1. Setup and Update Rules

  • Download the latest Hayabusa binary for Windows from the official GitHub releases pagearrow-up-right.

  • Open a command prompt or PowerShell in the folder containing the executable.

  • Update Hayabusa with the latest detection rules:

    DOS

    .\hayabusa.exe update-rules

2. Scan Local System Logs

  • Run the following command to scan your local machine's event logs (-l) and output the findings to a CSV timeline (-o):

    DOS

    .\hayabusa.exe csv-timeline -l -o results.csv
  • When prompted to load rule sets, press Enter to accept the defaults for all questions. This will load the core rules, including those for Sysmon.

Hayabusa scans local EVTX files and saves all findings into a single results.csv file for analysis.

3. Analyze Results in Timeline Explorer

  • Download and run Timeline Explorer from Eric Zimmerman's websitearrow-up-right.

  • In Timeline Explorer, go to File > Open and select the results.csv file you generated.

  • The tool will load all events and detections from the Hayabusa scan.

To quickly find critical alerts, drag the 'level' column header into the pane above to group all events by severity.

Last updated