# KAPE Target Example
# This example demonstrates using KAPE-style forensic collection profiles
# Uses includes to combine multiple base profiles similar to KAPE targets
# Include base profiles to provide comprehensive forensic coverage
# These profiles include patterns for malware, credentials, and network artifacts
includes = [
"../../profiles/base/malware.toml",
"../../profiles/base/credentials.toml",
"../../profiles/base/network.toml",
"../../profiles/base/forensics.toml"
]
decode = ["base64"]
tag = "kape-target"
# Additional browser artifact patterns to complement the base profiles
[[patterns]]
name = "Browser History URL"
pattern = "https?://[a-zA-Z0-9.-]+\\.[a-zA-Z]{2,}"
type = "regex"
[[patterns]]
name = "Cookie Data"
pattern = "cookie|session_id|auth_token"
type = "regex"
case-insensitive = true
# Windows execution artifacts
[[patterns]]
name = "Prefetch Reference"
pattern = "\\.pf$"
type = "regex"
[[patterns]]
name = "LNK File"
pattern = "\\.lnk$"
type = "regex"
# Registry artifact patterns
[[patterns]]
name = "Registry Hive"
pattern = "NTUSER\\.DAT|SAM|SECURITY|SOFTWARE|SYSTEM"
type = "regex"
case-insensitive = true
[[patterns]]
name = "Run Key"
pattern = "CurrentVersion\\\\Run"
type = "regex"
case-insensitive = true
# Signatures for triage
[[signatures]]
name = "High Value Artifacts"
query = "SELECT DISTINCT sha256 FROM pattern_matches WHERE pattern_name IN ('Registry Hive', 'Prefetch Reference', 'LNK File', 'Browser History URL')"
[[signatures]]
name = "Multiple Indicators"
query = "SELECT sha256, COUNT(DISTINCT pattern_name) as indicator_count FROM pattern_matches GROUP BY sha256 HAVING indicator_count > 3"