Hayabusa
Analyzing Local Windows Event Logs with Hayabusa
This guide shows how to use Hayabusa to scan local Windows Event Logs for threats and view the results in Timeline Explorer.
1. Setup and Update Rules
Download the latest Hayabusa binary for Windows from the official GitHub releases page.
Open a command prompt or PowerShell in the folder containing the executable.
Update Hayabusa with the latest detection rules:
DOS
.\hayabusa.exe update-rules
2. Scan Local System Logs
Run the following command to scan your local machine's event logs (
-l) and output the findings to a CSV timeline (-o):DOS
.\hayabusa.exe csv-timeline -l -o results.csvWhen prompted to load rule sets, press Enter to accept the defaults for all questions. This will load the core rules, including those for Sysmon.

results.csv file for analysis.3. Analyze Results in Timeline Explorer
Download and run Timeline Explorer from Eric Zimmerman's website.
In Timeline Explorer, go to
File > Openand select theresults.csvfile you generated.
The tool will load all events and detections from the Hayabusa scan.

Last updated