HEIMDALL DFIR
A unified investigation cockpit built for CSIRT / SOC / DFIR teams. Ingest, correlate and visualise any forensic source in a real-time interface.
How it works
β three steps from evidence to report
COLLECT
Upload any forensic artifact β disk images, EVTX logs, PCAP captures, RAM dumps, registry hives. Heimdall handles chunked upload with automatic resume and ClamAV scanning on every file.
ANALYSE
Artifacts are automatically parsed by the worker queue β Zimmerman Tools, Hayabusa, tshark β and indexed into a per-case Elasticsearch Super Timeline. Triage score computed in real time.
HUNT
Run YARA rules, Sigma hunts, correlate with TAXII Threat Intel feeds, map to MITRE ATT&CK, visualise lateral movement, and export a signed PDF report with Legal Hold manifest.
By the numbers
β key metrics of the platform
Features
β what Heimdall brings to your investigations
Forensic Analysis
Super Timeline multi-source via Elasticsearch, Hayabusa Sigma detections on EVTX, full Zimmerman Tools suite, PCAP extraction via tshark. All artifacts parsed asynchronously by the BullMQ worker.
Memory Forensics SOON
Chunked upload up to 256 GB with automatic resume. Full VolWeb + Volatility 3 integration is currently in development.
Threat Hunting
YARA engine with per-file/per-case scan, Sigma hunt on Super Timeline, GitHub bulk import (Neo23x0, SigmaHQ, Yara-Rules), TAXII 2.1 / STIX 2.1 Threat Intel with automatic post-ingestion correlation.
Automatic Detections
Timestomping ($SIA vs $FN), double extension (.pdf.exe), C2 beaconing score (0-100), persistence via Run Keys / LNK Startup / BITS Jobs / Sigma Hayabusa.
Triage & Investigation
Machine triage score (0-100, 16 rules), lateral movement graph (D3.js, Event IDs 4624/4648/4768), MITRE ATT&CK kill chain (14 phases), IOC enrichment via VirusTotal & AbuseIPDB.
SOAR & Automation
Parallel SOAR engine post-ingestion, DFIR Playbooks (Ransomware 11 steps, RDP 10, Phishing 9), Legal Hold with HMAC-SHA256 signed manifest, Sysmon configs bundled.
Local AI β Ollama
Global AI Chat with SSE streaming, Case Copilot with automatic context injection (IOCs, SOAR alerts, artifacts, notes). Supports qwen3, deepseek-r1, mistral.
Security & Admin
ClamAV mandatory scan, DoD 5220.22-M 7-pass hard delete, JWT rotation with Redis blacklist, automatic pg_dump backups, full audit log with HMAC, Docker CPU/RAM monitoring.
Collaboration
Live case chat (Socket.io), real-time analyst presence, investigation notes with XSS sanitisation, enriched PDF report (triage, YARA, Threat Intel, kill chain).
Parsers & Data Sources
β supported artifact types and analysis engines
| Parser | Artifact | Category |
|---|---|---|
| Hayabusa | EVTX β Sigma detections (critical/high/medium/low) | Event Logs |
| EvtxECmd | EVTX β Raw Windows event logs | Event Logs |
| MFTECmd | $MFT β Master File Table (timestamps, paths, sizes) | Filesystem |
| PECmd | Prefetch (.pf) β Execution history, DLL dependencies | Execution |
| LECmd | LNK (.lnk) β Recent files, volumes, target machines | Recent Activity |
| SBECmd | Shellbags β Folder navigation history | Navigation |
| AmcacheParser | Amcache.hve β Installed & executed programs | Execution |
| AppCompatCacheParser | ShimCache (SYSTEM) β Application execution | Execution |
| RECmd | Registry hives (SAM, SYSTEM, NTUSER.DAT, SOFTWAREβ¦) | Registry |
| JLECmd | Jump Lists β Recent files per application | Recent Activity |
| SrumECmd | SRUM (SRUDB.dat) β Network & CPU usage per process | Network / CPU |
| SQLECmd | SQLite (.sqlite, .db) β Chrome / Firefox / Edge history | Browser |
| RBCmd | Recycle Bin ($I*) β Deleted files, original path & date | Deleted Files |
| BitsParser | BITS (qmgr*.dat) β Background transfers, persistence | Persistence |
| tshark | PCAP (.pcap, .pcapng) β DNS / HTTP / TLS / TCP flows | Network |
| ClamAV | Any file β Antivirus scan & quarantine | Antivirus |
| Plugin | Description | Status |
|---|---|---|
| windows.pslist / pstree | Process list and tree | PLANNED |
| windows.cmdline | Command-line arguments per process | PLANNED |
| windows.netscan / netstat | Active and historical network connections | PLANNED |
| windows.dlllist | DLLs loaded per process | PLANNED |
| windows.malfind | Memory injection detection | PLANNED |
| windows.svcscan | Windows services enumeration | PLANNED |
| Artifact | Description | Category |
|---|---|---|
| WebCacheV01.dat | IE / Edge legacy browser cache | Browser |
| $LogFile / $UsnJrnl | NTFS change journal | Filesystem |
| WMI artifacts | WMI persistence β subscriptions, filters, consumers | Persistence |
| Thumbcache / IconCache | Visual artifacts β accessed images and files | Visual |
| Disk image mounting | .E01, .dd, .vmdk β full disk image analysis | Disk |
Use Cases
β illustrative investigation scenarios
RANSOMWARE RESPONSE
INSIDER THREAT
APT INVESTIGATION
100% MITRE ATT&CK Mapped
Heimdall artifacts, parsers and threat hunting rules provide complete visibility across all 14 enterprise tactical phases.
Security by Design
β Heimdall is built to be trusted with sensitive data
Architecture
β service topology & data flow
| Service | Image | Port(s) | Role |
|---|---|---|---|
| bifrost | nginx:alpine | 80 / 443 | Reverse proxy Β· rate-limit Β· SSL |
| asgard | node:18-alpine | 3000 | React frontend |
| odin | node:18-alpine | 4000 | Express API backend |
| yggdrasil | postgres:16-alpine | 5432 | PostgreSQL β DFIR schema |
| hermod | redis:7-alpine | 6379 | Redis β BullMQ Β· sessions Β· JWT |
| mimir | elasticsearch:8.13 | 9200 | Elasticsearch β Super Timeline |
| tyr | clamav:1.4 | 3310 | ClamAV antivirus daemon |
| huginn | node:18-alpine | β | BullMQ worker β artifact parsing |
| njord | minio/minio | 9000 / 9001 | MinIO S3 β RAM dump storage |
| hel-api | python:3.11-slim | β | VolWeb Django API |
| hel-worker | python:3.11-slim | β | Celery β Volatility 3 tasks |
| hel-proxy | nginx:alpine | 8888 | VolWeb reverse proxy (SSO) |
Tech Stack
β technologies powering Heimdall
Supported OS
β host OS for running Heimdall + analyzed artifact OS
| Component | Minimum | Recommended |
|---|---|---|
| RAM | 8 GB | 16 GB+ |
| CPU | 4 cores | 8 cores+ |
| Disk | 50 GB SSD | 200 GB+ NVMe SSD |
| OS | Linux / Windows / macOS | Ubuntu 22.04 LTS |
| Docker | 24.0+ | latest |
| Docker Compose | v2.0+ | latest |
| Node.js | 18.x | 20.x LTS |
Integrations
β external tools and services supported
Tested On
β incident types Heimdall has been tested against
GitHub Activity & Team
β latest commits and contributors
Roadmap
β planned releases and milestones
Changelog
β recent releases
+ Ollama Case Copilot with automatic context injection
+ TAXII 2.1 / STIX 2.1 Threat Intel with post-ingestion correlation
+ Legal Hold β HMAC-SHA256 signed manifest
+ C2 beaconing score (0β100) with beacon detection engine
+ SOAR parallel engine β Ransomware / RDP / Phishing playbooks
~ Fix chunked upload resume on large RAM dumps
~ Fix Elasticsearch per-case index isolation
v0.8.0β 2026
+ YARA bulk import from GitHub (Neo23x0, SigmaHQ, Yara-Rules)
+ Lateral movement graph β D3.js (Event IDs 4624/4648/4768)
+ MITRE ATT&CK kill chain (14 phases)
+ Live case chat β Socket.io real-time collaboration
~ Fix JWT rotation edge case on concurrent requests
Installation
β up and running in minutes
docker compose up manually β the script handles secret generation, container build and all database migrations automatically.DFIR Glossary
β key terms used in Heimdall
| Artifact / Term | Location / Type | Forensic Value |
|---|---|---|
| $MFT | C:\$MFT | Core NTFS index. Contains $STANDARD_INFORMATION (0x10) and $FILE_NAME (0x30) timestamps. Crucial for detecting timestomping. |
| Prefetch (.pf) | C:\Windows\Prefetch\ | Execution evidence. Stores run counts, last 8 execution times, and handles/DLLs loaded within the first 10 seconds. |
| Amcache | C:\...\Amcache.hve | Tracks installed/executed applications. Stores SHA1 hashes, full file paths, and first execution timestamps. |
| ShimCache | SYSTEM\...\AppCompatCache | Application Compatibility Cache. Stores up to 1024 execution entries, including the Last Modified time of the binary. |
| Shellbags | NTUSER.DAT\...\BagMRU | Proves folder access/navigation by a specific user. Works even for deleted directories, USB drives, and network shares. |
| SRUM | C:\...\SRUDB.dat | System Resource Usage Monitor. ESE database tracking 30-day historical network usage (bytes sent/received) and CPU time per process. |
| EVTX Logs | C:\...\winevt\Logs\ | Windows Event Logs. Key IDs: 4624 (Logon), 4688 (Process Creation with Command Line), 7045 (Service Installation). |
| LNK Files | ...\Windows\Recent\ | Records file/folder access. Contains the Target's MAC address, Volume Serial Number, and Original Path. |
| Jump Lists | ...\AutomaticDestinations\ | Tracks files opened by specific applications pinned to the taskbar. Analyzed via AppIDs. |
| BITS | C:\...\Downloader | Background Intelligent Transfer Service (qmgr.dat). Legitimate updater service frequently abused by malware for C2 and persistence. |
| YARA | Detection Engine | Pattern matching tool for malware identification based on hexadecimal strings, regular expressions, and byte sequences. |
| Sigma | Detection Engine | Generic signature format for log events (SIEM). Used by Heimdall via Hayabusa to scan EVTX files for malicious behaviors. |
| TAXII / STIX | Threat Intelligence | Standardized JSON format (STIX 2.1) and HTTPS transport protocol (TAXII 2.1) used to ingest and correlate Indicators of Compromise (IOCs). |
FAQ
β frequently asked questions
Credits
β open-source projects that make Heimdall possible