diff --git a/Modules/Apps/GitHub/Chainsaw.mkape b/Modules/Apps/GitHub/Chainsaw.mkape index f86c9af0d..7dfe376a9 100644 --- a/Modules/Apps/GitHub/Chainsaw.mkape +++ b/Modules/Apps/GitHub/Chainsaw.mkape @@ -1,9 +1,9 @@ Description: Chainsaw - Rapidly Search and Hunt through Windows Event Logs Category: EventLogs Author: Andrew Rathbun -Version: 2.0 +Version: 2.1 Id: e5912d52-6b31-4480-9255-8c5433326d85 -BinaryUrl: https://github.com/WithSecureLabs/chainsaw/releases/download/v2.3.1/chainsaw_all_platforms+rules+examples.zip +BinaryUrl: https://github.com/WithSecureLabs/chainsaw/releases/latest/download/chainsaw_all_platforms+rules+examples.zip ExportFormat: csv Processors: - diff --git a/Modules/Apps/GitHub/Chainsaw_MFT_Dump.mkape b/Modules/Apps/GitHub/Chainsaw_MFT_Dump.mkape new file mode 100644 index 000000000..1c4ce8a87 --- /dev/null +++ b/Modules/Apps/GitHub/Chainsaw_MFT_Dump.mkape @@ -0,0 +1,21 @@ +Description: 'Chainsaw: Dump $MFT files' +Category: FileSystem +Author: Reece394 +Version: 1.0 +Id: 47e20c2d-eef3-4902-a80d-48aca1329fec +BinaryUrl: https://github.com/WithSecureLabs/chainsaw/releases/latest/download/chainsaw_all_platforms+rules+examples.zip +ExportFormat: json +FileMask: $MFT|*.mft|mft.bin +Processors: + - + Executable: Chainsaw\Chainsaw.exe + CommandLine: dump %sourceFile% --json --output %destinationDirectory%\%d%_MFT_Output.json + ExportFormat: json + +# Documentation +# https://github.com/WithSecureLabs/chainsaw +# Versions of Chainsaw 2.0 and above have changed rule directories +# The Chainsaw executable should reside in .\KAPE\Modules\bin\chainsaw\Chainsaw.exe +# PLEASE NOTE: You may have to rename the Windows executable to Chainsaw.exe manually +# As of posting 11/14/2024 you have to build Chainsaw from source to get $MFT filename support. This will change after v2.10.1. +# Prior versions only support MFT files named with .mft or .bin file extensions.