📢 Read the latest Release Notes to learn what's new on Hunters! 💡

Halcyon

Prev Next

TL;DR

Supported data types

3rd party

detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Halcyon Logs

✅

✅

✅

halcyon_logs

JSON

S3


Overview

Halcyon.ai is a cybersecurity company that provides an AI-powered ransomware resilience platform designed to prevent, detect, and recover from ransomware attacks across enterprise environments. Founded in 2021 and purpose-built to address the growing threat of ransomware, Halcyon focuses exclusively on eliminating the operational and financial impact of ransomware by combining advanced threat detection, automated response, and rapid recovery capabilities into a single unified solution. Its platform leverages proprietary machine learning models and behavioral analysis to identify ransomware activity in real time, while also incorporating mechanisms to capture encryption keys and enable automated file decryption.

The Halcyon platform integrates seamlessly with existing security and IT infrastructure, including endpoint detection and response (EDR), SIEM, and backup systems, enhancing rather than replacing current defenses. It provides end-to-end coverage across the ransomware attack lifecycle—from initial access and lateral movement to encryption and data exfiltration—while offering built-in capabilities such as tamper protection, data exfiltration prevention, and automated incident containment. Additionally, Halcyon delivers managed services through its 24/7 Ransomware Operations Center (ROC), helping organizations monitor, respond to, and recover from attacks with minimal downtime. By combining prevention, detection, and instant recovery within a single platform, Halcyon enables enterprises to strengthen cyber resilience, reduce reliance on ransom payments, and maintain business continuity.

Supported data types

Halcyon Event Logs

Overview:

Halcyon Event Logs are a structured telemetry and logging capability within the Halcyon platform that provide detailed visibility into ransomware-related activities, detections, and automated response actions across protected endpoints.

Table name: halcyon_logs

Send data to Hunters

Hunters supports the ingestion of Halcyon Logs via an intermediary AWS S3 bucket.

To connect Halcyon logs via S3:

  1. Export your logs from Halcyon to an AWS S3 bucket.

  2. Once the export is completed and the logs are collected to S3, follow the steps in this section.

Expected format

Logs are expected in JSON:

{ "action": "Report", "asset": { "id": "11aa2f22-33d3-44c4-a55a-eb6666b6d6a6", "kind": "Endpoint", "name": "cd3-e-f-ab012.example.com" }, "bytes": 1000000000, "elapsedTimeInMs": 84466000, "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08", "kind": "UploadThresholdExceeded", "occurredAt": "2024-02-32T24:21:06.965Z", "process": { "artifact": { "filePath": "/usr/sbin/rsyslogd", "kind": "File", "sha256": "972d921d70d07d418b93c6063e946638122a1d71566062085e739e1c55afd977" }, "commandLine": "/usr/sbin/rsyslogd -n", "kind": "FileProcessResponse", "parentPid": "1", "pid": "1514", "userId": "0-None-12345678", "username": "root" }, "tenantId": "f97df110-f4de-492e-8849-4a6af68026b0", "threshold": 1000000000 }
{ "action": "Report", "asset": { "id": "11aa2f22-33d3-44c4-a55a-eb6666b6d6a6 ", "kind": "Endpoint", "name": "1CD2345EFG-H" }, "bytes": 1000022, "elapsedTimeInMs": 84466000, "id": "497f6eca-6276-4993-bfeb-53cbbbba6f08", "kind": "UploadThresholdExceeded", "occurredAt": "2024-02-32T24:21:06.965Z", "process": { "artifact": { "filePath": "C:\\WINDOWS\\System32\\svchost.exe", "kind": "File", "sha256": "949bfb5b4c7d58d92f3f9c5f8ec7ca4ceaffd10ec5f0020f0a987c472d61c54b" }, "commandLine": "C:\\WINDOWS\\System32\\svchost.exe -k NetworkService -p -s WinRM", "kind": "FileProcessResponse", "parentPid": "1122", "pid": "11334" }, "tenantId": "f97df110-f4de-492e-8849-4a6af68026b0", "threshold": 1000000000 }