DiscoverTLP - The Digital Forensics PodcastEpisode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool
Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool

Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool

Update: 2024-10-15
Share

Description

Send us a text

Key Takeaways:

  • Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments.
  • Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Active Directory replication.
  • Efficient Incident Response: Hayabusa is ideal for incident response workflows, enabling teams to quickly triage and analyze Windows logs to detect potential breaches or malicious activity.
  • Importance of Informational Alerts: Informational alerts can indicate early reconnaissance phases of attacks and should not be dismissed.
  • Hypothesis-Driven Threat Hunting: Build a threat hunting hypothesis using MITRE ATT&CK or industry-specific threat intelligence to narrow the focus of the search.
  • Integration with SIEM and TimeSketch: Hayabusa supports integration with security tools like SIEM and can export logs into TimeSketch for further analysis and visualization.
  • Open-source and Free: Hayabusa is freely available to the cybersecurity community, making it an essential tool for threat detection without added cost.
Comments 
In Channel
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool

Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool

Clint Marsden