top of page
Search

Hayabusa: A Powerful Log Analysis Tool for Forensics and Threat Hunting

  • Nov 19, 2023
  • 5 min read

Updated: Jul 15


ree

Updated on July 15, 2025

By someone who hates dry cybersecurity guides as much as you do

Let’s talk about a seriously underrated threat-hunting combo:

Hayabusa and Sigma rules.

If you're into threat detection, blue teaming, or incident response — or even if you're just curious about how to spot evil from Windows logs — this is one rabbit hole you'll actually enjoy going down.


---------------------------------------------------------------------------------------------------------

🤔 First off, what even is Sigma?

Alright, let’s simplify.

Think of Sigma as the "universal translator" for security logs. It was created by Thomas Patzke and has grown into a massive open-source project supported by the community. Unlike tools like Snort (for network stuff) or YARA (for file-based threats), Sigma deals with log data — like Windows Event Logs, syslogs, cloud logs, etc.


Here's the beauty:

Sigma gives us a platform-agnostic way to describe suspicious behavior. That means you can write a detection rule once and use it across different SIEMs or tools. It’s kind of like writing one email and having it auto-translated for everyone in your office, no matter what language they speak. Handy, right?


---------------------------------------------------------------------------------------------------------


💻 Enter Hayabusa: The Samurai of Windows Log Hunting

Now, what if I told you there’s a tool that reads Windows event logs and automatically applies Sigma rules to hunt for threats?


Say hello to Hayabusa — which literally means “falcon” in Japanese. 🦅 And just like a falcon, this tool is fast, sharp, and built for one thing: spotting evil in your event logs.

Created by Yamato Security, Hayabusa can churn through EVTX files or even JSON-converted logs and flag anomalies based on a growing rule set.


📦 What does Hayabusa support?

  • Runs on Windows, macOS, and Linux

  • Accepts:

    • Local system event logs

    • Saved .evtx files

    • Full directories of logs


  • Outputs:

    • CSV (for spreadsheet nerds)

    • HTML (for a pretty summary)

    • JSON (for API nerds or automation fans)



🔍 Why Should You Care?

Because logs don’t lie — but they do hide things really well.

Windows logs are full of juicy forensic breadcrumbs: logon events, privilege use, command executions, service creations, and more. The problem is, they’re overwhelming. You’ll drown in logs before you spot the one that matters.

Hayabusa + Sigma is like having a log-sniffing dog that doesn’t get tired.


🧠 Quick Tip: Keeping Hayabusa Updated

Threats evolve fast. So should your detections.

With the simple command:

C:\Users\Akash's\Downloads\hayabusa-3.3.0-all-platforms> .\hayabusa-3.3.0-win-x64.exe update-rules
ree

Hayabusa fetches the latest Sigma rules from the official repo and merges them into its detection engine. It’s like giving your detection engine a brain upgrade on the fly.



⚡ Real Use Case: CSV-Timeline (Output)

Let’s say you want to run Hayabusa on your own machine. You just do:

C:\Users\Akash's\Downloads\hayabusa-3.3.0-win-x64-live-response>hayabusa-3.3.0-win-x64.exe csv-timeline -l -o output1.csv
ree
Output:
ree


⚡ Real Use Case: HTML Report

Let’s say you want to run Hayabusa on your own machine and create HTML Report. You just do:

C:\Users\Akash's\Downloads\hayabusa-3.3.0-win-x64-live-response>hayabusa-3.3.0-win-x64.exe csv-timeline -l -o result.csv -H output.html
ree

Boom. You get an HTML summary with clickable links showing which Sigma rule matched and why.


⚠️ One caveat though:

That HTML report is a summary. For the nitty-gritty details, like which process or user triggered the alert, you’ll want to check the CSV output. That’s where the real breadcrumbs are.

ree


📚 Bonus: What Makes Sigma So Awesome?

  • Over 3000 rules (and counting!) for all types of threats

    ree
  • Can describe behaviors across:

    • Windows

    • Linux

    • macOS

    • Cloud platforms

    • Apps and more

  • Easy to write, easy to read (even for beginners)

  • Growing ecosystem of tools that support it (not just Hayabusa)



---------------------------------------------------------------------------------------------------------

🔧 Pro Tip: Combine with Velociraptor

If you're managing multiple endpoints, try plugging Hayabusa into Velociraptor. It’s an open-source digital forensics and incident response (DFIR) framework, and Hayabusa fits in beautifully to give you log-based detection across your fleet.


Check out My Velociraptor series Link below:


---------------------------------------------------------------------------------------------------------


Imagine this: you’ve got 50 GB of event logs, and you’re tasked with figuring out what happened, when it happened, and where it happened. Doing that manually? Forget it. You’ll be buried in logs till next week.

That’s where Hayabusa’s timeline mode steps in.


With a simple command, Hayabusa can:

  • Parse a folder full of EVTX files (yes, even 50+ GB of them)

  • Apply Sigma rules to detect threats

  • Generate a CSV timeline showing you what went down and when


That CSV file becomes your investigative cheat sheet.


---------------------------------------------------------------------------------------------------------

🧪 Real-World Example: Hunting Across Logs with a Timeline

Here's the full command we used on a windows system with a big ol’ folder of logs:

hayabusa csv-timeline -d eventlogs/ -T -o hayabusa-threathunting.csv 
-E --timeline-start "2025-07-01 00:00:00 +00:00" 
--timeline-end "2025-07-15 00:00:00 +00:00" --no-color

or 

.\hayabusa-3.3.0-win-x64.exe csv-timeline --live-analysis -T -o hayabusa-threathunting.csv -E --timeline-start "2025-07-01 00:00:00 +00:00"  --timeline-end "2025-07-15 00:00:00 +00:00" --no-color

Let’s break that down:

Argument

What it does

-d eventlogs/ or --live-analysis for live

Directory containing EVTX files

-T

Enables timeline output in the terminal

-o hayabusa-threathunting.csv

Where to save the CSV file

-E

Only review specific event IDs (speeds things up)

--timeline-start / --timeline-end

Analyze logs only within a specific time range

--no-color

Removes terminal color codes for clean output

Pretty neat, right?

---------------------------------------------------------------------------------------------------------

📊 Why CSV Output Is a Game Changer

Hayabusa's CSV output includes super useful fields like:

  • Timestamps

  • Event IDs

  • Threat severity

  • Rule titles

  • MITRE ATT&CK IDs (if available)

  • Computer name (if analyzing multiple systems)

ree

That last part is huge for environments with more than one system. You can correlate threats across endpoints and spot patterns like lateral movement or domain-wide compromise.


---------------------------------------------------------------------------------------------------------

🧰 Organizing the Madness with Timeline Explorer

Now you’ve got this CSV — what next?

Sure, you can open it in Excel or Google Sheets, but if you really want to pivot, filter, and sort like a DFIR wizard, use Timeline Explorer by Eric Zimmerman.


Here’s what you do:

  1. Open the CSV in Timeline Explorer

  2. Drag-n-drop columns like:

    • Level

    • Rule Title

    • Computer

ree
Now you can group alerts by severity, then drill down by rule, then system. Boom. Instant clarity.

---------------------------------------------------------------------------------------------------------

📦 Don’t Stop at CSVs – Integrate & Automate

Hayabusa doesn’t lock you into CSVs. You can also:


  • Use json-timeline for structured JSON output

  • Load results into SIEM platforms

  • Push into Elasticsearch for dashboards

  • Integrate with Neo4j Desktop for graph-based attack path analysis



You can also change Hayabusa’s output format by using custom profiles:

hayabusa-3.3.0-win-x64.exe list-profiles
ree

This shows you all the output templates. Want to include ATT&CK IDs or remove some columns? Create your own custom YAML profile.


---------------------------------------------------------------------------------------------------------

⚙️ Wait, How Do I Get Logs From All My Machines?

Great question.

Grab logs from remote systems using a quick PowerShell helper script:📥 Copy-RemoteWindowsLogs.ps1


This lets you collect EVTX files across your domain and organize them by hostname, ready for Hayabusa to chew through.

---------------------------------------------------------------------------------------------------------

🧩 Other Hayabusa Tricks You Should Know

Besides csv-timeline, Hayabusa comes packed with other commands:

  • update-rules – grab the latest Sigma + Hayabusa rules from GitHub

  • json-timeline – same timeline, just in JSON

  • search – keyword-based hunting across logs

  • logon-summary – view logon patterns

  • metrics – get event frequency stats


---------------------------------------------------------------------------------------------------------


🔐 New in Hayabusa v2.18.0+: Live Response Packages!

Hayabusa now offers special Live Response packages designed for endpoint use. These packages include the binary, an XOR-encoded Sigma rules file, and a single config file — all bundled together.

Why?

To avoid triggering antivirus tools like Windows Defender and to minimize file writes on disk (protecting forensic artifacts like the USN Journal). Just look for the ZIP files with live-response in the name.

ree
ree

---------------------------------------------------------------------------------------------------------


Final Thoughts

If you’re working in threat detection, response, or forensics, you don’t want to sleep on Hayabusa.


It’s fast. It’s flexible. It supports the Sigma rule ecosystem. And most importantly — it makes sense of the chaotic mess that is Windows Event Logs.

So next time you’re looking at a pile of .evtx files wondering where to even start… just remember:

Hayabusa + Sigma = Instant Timeline, Actionable Threats.

Give it a shot — your future self will thank you. 🙌

-------------------------------------------Dean-------------------------------------------------------------



Check Out below article where i have shared few commands to get you started with analysis:

 
 
 
bottom of page