Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Example: evtx

Inputs

  • examples/inputs/evtx-samples/event_logs.txt
  • examples/inputs/evtx-samples/sample_security.evtx

Profile

# Windows Event Log Parsing Example
# This demonstrates parsing real Windows Event Log (.evtx) files
# The sample_security.evtx file contains a minimal valid EVTX structure
# Use --parse-evtx CLI flag to parse the event log files

decode = []

tag = "evtx"

# Security event patterns
[[patterns]]
  name = "Logon Event 4624"
  pattern = "4624"
  type = "string"

[[patterns]]
  name = "Failed Logon 4625"
  pattern = "4625"
  type = "string"

[[patterns]]
  name = "Account Lockout 4740"
  pattern = "4740"
  type = "string"

[[patterns]]
  name = "New Process 4688"
  pattern = "4688"
  type = "string"

[[patterns]]
  name = "Scheduled Task 4698"
  pattern = "4698"
  type = "string"

# PowerShell logging
[[patterns]]
  name = "PowerShell Event"
  pattern = "Microsoft-Windows-PowerShell"
  type = "string"
  case-insensitive = true

[[patterns]]
  name = "Script Block"
  pattern = "ScriptBlockText"
  type = "string"

# Suspicious commands in events
[[patterns]]
  name = "Encoded Command"
  pattern = "-encodedcommand|-enc"
  type = "regex"
  case-insensitive = true

[[patterns]]
  name = "Download Cradle"
  pattern = "DownloadString|Invoke-WebRequest|IEX"
  type = "regex"
  case-insensitive = true

# Sysmon events
[[patterns]]
  name = "Process Create (Sysmon 1)"
  pattern = "EventID.*1.*ProcessCreate"
  type = "regex"

[[patterns]]
  name = "Network Connection (Sysmon 3)"
  pattern = "EventID.*3.*NetworkConnect"
  type = "regex"

# EVTX file header pattern (hex for "ElfFile")
[[patterns]]
  name = "EVTX Header"
  pattern = "45:6C:66:46:69:6C:65"
  type = "bytes"

Report outputs

Triage report (converted from triage_report.json)

total_files2
critical_count0
high_count0
medium_count0
low_count1
minimal_count1
must_investigate_count0
all_scoresNone
generated_at2025-12-03T09:19:44.307018600+00:00

top_scores

characteristics_scorefile_typefile_type_scoremust_investigatepathpattern_count_scorepattern_matchespattern_severity_scorereasonsrisk_levelscoresha256
0EventLog35False/sample_security.evtx510["High-value artifact type: Event Log", "1 suspicious patterns detected"]Low4081154e8ee0307f4d2865da14957e6b6928dd89b51e1985840d166948481ac136
0Other0False/event_logs.txt151111["11 suspicious patterns detected"]Minimal2695def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8b

CSV outputs

errors.csv

Empty CSV

files.csv

pathfile_namesha256file_createdfile_modifiedfile_accessedmime_types_from_file_extensionis_symbolic_linkis_extracted_fileis_decoded_fileis_deobfuscated_filetag
/event_logs.txtevent_logs.txt95def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8b2025-12-03T08:56:20.495889189Z2025-12-03T08:56:20.495889189Z2025-12-03T09:19:34.645985218Z["text/plain"]0000
/sample_security.evtxsample_security.evtx81154e8ee0307f4d2865da14957e6b6928dd89b51e1985840d166948481ac1362025-12-03T09:16:08.041585051Z2025-12-03T09:16:08.041585051Z2025-12-03T09:19:34.644985217Z[]0000

pattern_matches.csv

idsha256pattern_namematch_typematchlocationlength
181154e8ee0307f4d2865da14957e6b6928dd89b51e1985840d166948481ac136EVTX HeaderbytesElfFile07
295def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bEncoded Commandregex-encodedcommand46:1715
395def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bDownload CradleregexInvoke-WebRequest45:217
495def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bDownload CradleregexIEX45:573
595def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bLogon Event 4624string46245:104
695def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bFailed Logon 4625string462512:104
795def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bFailed Logon 4625string462519:104
895def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bAccount Lockout 4740string474025:104
995def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bNew Process 4688string468830:104
1095def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bScheduled Task 4698string469836:104
1195def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bScript BlockstringScriptBlockText43:115
1295def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8bPowerShell EventstringMicrosoft-Windows-PowerShell42:928

signature_matches.csv

Empty CSV

unique_files.csv

sha256sha1md5file_sizemime_type_for_contentshannon_entropy
95def1ae00f1f2aa96662fe9bf5082456259f378e436b7f9a57f996abba9ab8b1525a63af21b321526717c020ea814cad7afbe04f17445a5491a3e777d7bc9ce1d80c6441334text/plain5.34833938232107
81154e8ee0307f4d2865da14957e6b6928dd89b51e1985840d166948481ac136c59f06b8df6ff692114b8b80a1a0164e7ee3dc9eb37b49735487f1ecfb9713839aeaf90369632application/octet-stream0.0063210226671861