top of page
Search

Hayabusa.exe: Essential Commands for In-depth Log Analysis

  • Nov 20, 2023
  • 3 min read

Updated: Jul 15

ree

Updated on 15 July, 2025
Understand Hayabusa completely check out below article:

Hayabusa Command Arsenal for Deep Analysis:


🖥️ 1. computer-metrics – Which Machines Logged the Most?

Before you even start analyzing logs, you might want to know: Which system created the most log entries? That’s where computer-metrics comes in.

s.


🔧 Example Commands:

# On a live system
hayabusa.exe computer-metrics --live-analysis

# On a directory of logs
hayabusa.exe computer-metrics -d logs/

# On a single EVTX file
hayabusa.exe computer-metrics -f system.evtx
⚠️ Heads-up: Windows sometimes logs inconsistent computer names (like lowercase vs uppercase or even a different name altogether in Win11), so use this as an estimate, not gospel truth.

📊 2. eid-metrics – Know Your Event ID Distribution

Want a quick summary of what types of events (Event IDs) dominate your log files? That’s where eid-metrics helps.

It prints out the total count and percentage of each Event ID across logs, separated by channel.


🔧 Example Commands:

# On a live system
hayabusa.exe eid-metrics --live-analysis

# On a directory of logs
hayabusa.exe eid-metrics -d logs/

# On a single file
hayabusa.exe eid-metrics -f system.evtx
Perfect when you're trying to spot outliers or excessive logging behavior.

📁 3. log-metrics – Get the Big Picture

Think of this as your log metadata report. It gives you:

  • Log file names

  • Computer names

  • Number of events

  • First & last timestamps

  • Channels & Providers


🔧 Example:

hayabusa.exe log-metrics --live-analysis
hayabusa.exe log-metrics -d logs/
This is a great way to sanity-check your input before diving into detection or timeline work.

🔐 4. logon-summary – Who Logged In (and Failed)?

This one’s a favorite in IR cases. It summarizes user logons, showing:

  • Usernames

  • Success counts

  • Failure counts


🔧 Examples:

# On live system
hayabusa.exe logon-summary --live-analysis

# On a directory of EVTX files
hayabusa.exe logon-summary -d logs/
Perfect for identifying brute-force attempts, suspicious user activity, or just getting a quick login audit.

🎯 5. pivot-keywords-list – Find What’s Weird

This one’s pure gold for threat hunting.

It generates a list of keywords (like usernames, hostnames, process names, etc.) seen in logs — so you can find outliers or suspicious entities.


💡 Pro tip: Use -m critical to only look at keywords in critical alerts, and build up from there.

🔧 Examples:

# View pivot keywords from critical events
hayabusa.exe pivot-keywords-list -d logs/ -m critical

# Save results to files
hayabusa.exe pivot-keywords-list -d logs/ -m critical -o keywords
 
or 

hayabusa-3.3.0-win-x64.exe pivot-keywords-list --live-analysis -m critical -o keywords --no-wizard
It’ll generate files like keywords-Users.txt, keywords-IpAddresses.txt, etc.
ree

🛠 Use case: Take that keyword list and use it with grep to build a custom timeline:

grep -f keywords.txt timeline.csv

Customize the search fields by editing the config file:

./rules/config/pivot_keywords.txt

🔎 6. search – Deep-Dive with Keywords or Regex

Hayabusa’s search command isn’t limited to detection results — it lets you search across all events, even those not flagged by rules.



🔧 Examples:

# Search for 'mimikatz' in all logs
hayabusa.exe search -d logs/ -k "mimikatz"

# Search for multiple keywords
hayabusa.exe search -d logs/ -k "mimikatz" -k "kali"

# Case-insensitive search
hayabusa.exe search -d logs/ -k "mimikatz" -i

# Search using regex (e.g., IP addresses)
hayabusa.exe search -d logs/ -r "(?:[0-9]{1,3}\.){3}[0-9]{1,3}"

# Field-specific search (e.g., WorkstationName)
hayabusa.exe search -d logs/ -r ".*" -F WorkstationName:"kali"


🧠 Wrap-Up: Power at Your Fingertips

With these commands, Hayabusa becomes more than just a Sigma rule engine — it turns into a full-blown, flexible DFIR toolkit.


Here’s a quick recap:

Command

Purpose

computer-metrics

See log volume per system

eid-metrics

View Event ID distribution

log-metrics

Show log metadata (timestamps, channels, etc.)

logon-summary

Summarize login activity

pivot-keywords-list

Pull out high-value keywords for hunting

search

Deep keyword & regex searches

csv-timeline / json-timeline

Build visual timelines of suspicious events


----------------------------------------------------------------------------------------------------------

👉 Use these tools together for fast, smart, and scalable threat hunting — whether you're working a single laptop or an enterprise breach.

-----------------------------------------------------Dean---------------------------------------------


 
 
 

Comentários


bottom of page