Parse Windows Event Logs (EVTX)

Parses Windows Event Log (.evtx) files and extracts structured forensic data for analysis. Optionally runs Sigma rules against the extracted events for threat detection.

Parse Windows Event Logs (EVTX)

Parses Windows Event Log (.evtx) files and extracts structured forensic data for analysis. Optionally runs Sigma rules against the extracted events for threat detection.

API Endpoint

POST /analysis/winevtx/parse

HTTP Headers

  • Content-Type: application/json
  • X-Cursed-Api-Token: API token for authentication
  • X-Cursed-Api-Enc-Key: Encryption key for authenticated users (required if using encrypted files)

Request Method

POST

Parameters

Request Body (JSON):

ParameterTypeRequiredDescription
file_idsarrayYesArray of file UUIDs to parse (100 files maximum limit and up to 1 GB total)
run_sigma_rulesbooleanYesWhether to run Sigma rules against extracted events

Request Body Schema

{
  "file_ids": ["string (UUID)", "string (UUID)", ...],
  "run_sigma_rules": true
}

Response Format

Success Response (200 OK):

{
  "id": "987e6543-e89b-12d3-a456-426614174000",
  "job_name": "Stellar Phoenix Parser",
  "message": "Job queued",
  "category": "winevtx"
}

Error Response (400 Bad Request):

{
  "error": "No file IDs provided"
}

{
  "error": "Too many file IDs provided"
}

{
  "error": "Max EVTX analysis size limit exceeded (1GB)"
}

{
  "error": "Failed to download file"
}

Error Response (401 Unauthorized):

{
  "error": "Unauthorized"
}

Error Codes

HTTP StatusDescription
200Success - Analysis job queued
400Bad Request - Invalid parameters or file limit exceeded
401Unauthorized - Missing authentication for private files
413Payload Too Large - Files exceed 1GB total size limit
500Internal Server Error - Server processing error

Example cURL Commands

Parse EVTX with Sigma Rules

curl -X POST https://api.cursedtools.com/analysis/winevtx/parse \
  -H "Content-Type: application/json" \
  -H "X-Cursed-Api-Token: your_api_token" \
  -H "X-Cursed-Api-Enc-Key: your_encryption_key" \
  -d '{
    "file_ids": [
      "94ba8675-7cfd-44a2-b85f-a3fa1bda69de",
      "a72a10f9-b8b3-4ba5-bd15-9418a37a3202"
    ],
    "run_sigma_rules": true
  }'

Parse EVTX without Sigma Rules

curl -X POST https://api.cursedtools.com/analysis/winevtx/parse \
  -H "Content-Type: application/json" \
  -H "X-Cursed-Api-Token: your_api_token" \
  -H "X-Cursed-Api-Enc-Key: your_encryption_key" \
  -d '{
    "file_ids": ["94ba8675-7cfd-44a2-b85f-a3fa1bda69de"],
    "run_sigma_rules": false
  }'

Example Response

{
  "id": "d829053e-2d24-4f93-bfd0-14e36e160930",
  "job_name": "Arcane Wizard Parser",
  "message": "Job queued",
  "category": "winevtx"
}

Job Results

Once parsing is complete, the job will contain structured analysis results that can be retrieved using the Job Status API. Results may include:

Analysis Types

Result TypeDescription
OverviewKey general insights for the processed file, including Sigma matches if included
Process Inference GraphA heuristically extracted and optimised graph of process ID relationships within event logs
Key Event TimelineChronological event sequence of the most notable observed events within the event logs that were submitted
Process AnalysisProcess creation, termination, and execution data insights with common anomaly detection
Network AnalysisNetwork event insights, domain, URL and IP address connections and lateral movement attempts
AuthenticationAuthentication, authorization, privileged account monitoring, remote access and other common traits as insights
PersistenceInsights about the most common types of persistence mechanisms that are used in-the-wild

Sigma Rule Benefits

When run_sigma_rules is enabled:

  • Automatic threat detection using community rules
  • Malware behavior identification
  • Suspicious activity highlighting
  • IoA matching against known threats
  • Attack technique mapping (MITRE ATT&CK)

Processing Notes

File Requirements

  • Files must be valid Windows Event Log (.evtx) format
  • Maximum 100 files per request
  • Total size limit of 1GB across all files
  • Files are processed asynchronously

Performance Considerations

  • Large EVTX file batches may take several minutes to process
  • Sigma rule analysis adds additional processing time
  • Job priority determined by user subscription level
  • Multiple files are processed in parallel when possible

Example Use Cases

cURL Example

# Parse security logs from compromised system
curl -X POST https://api.cursedtools.com/analysis/winevtx/parse \
  -H "X-Cursed-Api-Token: your_api_token" \
  -H "X-Cursed-Api-Enc-Key: your_encryption_key" \
  -d '{
    "file_ids": ["security-log-uuid"],
    "run_sigma_rules": true
  }'

Notes

  • Maximum of 100 files can be analyzed in a single request
  • Total file size limit is 1GB across all files
  • Job results can be retrieved using the job status endpoint
  • Authentication is required for private/encrypted files
  • Sigma rules are maintained and updated regularly
  • Job names are auto-generated using creative memorable combinations
  • Priority is determined by user subscription level
  • Unauthenticated users can analyze public files only
  • The analysis creates a background job that processes files asynchronously
  • Results include searchable summary data for efficient querying