# Event Log Analysis

## Event logs

Records events that occur on a Windows operating system.

It's critical source of information for&#x20;

* Investigating security incidents,&#x20;
* Identifying malicious/susp activities
* Understanding system events

Logs doesn’t lie! But it can be clear/delete by the Threat actor...

Event logs is located at C:\Windows\System32\winevt\Logs

## Save time

Read and investigate the event logs from A-Z is time consuming for CTF. So, we use automate scanner such as Hayabusa to scan the event logs and parse the result.

## Hayabusa

Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.

```powershell
hayabusa.exe update-rules
hayabusa.exe csv-timeline -d C:\Users\training\Desktop\C\Windows\System32\winevt\logs -p verbose -o ..\results.csv
```

<figure><img src="/files/KJQUNe1rClIAXsv3kMLc" alt=""><figcaption></figcaption></figure>

Then open the the *results.csv* in Timeline Explorer

<figure><img src="/files/8SqpC6XJrXHnBSBQqF57" alt=""><figcaption></figcaption></figure>

## Event Log Explorer

Manually, use event log explorer to manually analyze the event logs

Please refer: <https://fareedfauzi.github.io/2023/12/22/Windows-Forensics-checklist-cheatsheet.html#windows-event-logs-analysis>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://fareedfauzi.gitbook.io/ctf-training/forensic/kape-triage/event-log-analysis.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
