Musashi is a Python 3 tool designed for quickly analyzing logs using SIGMA rules and DL anomaly detection techniques. It works with various log formats, including Azure, Defender, Cortex, and CarbonBlack. Musashi also identifies Indicators of Compromise (IOCs) to help with fast threat detection and incident response.
below is sample demo of EDR logs from Defender Musashi demonstrates the use case of EDR logs from Defender detecting Lumma Stealer through a fake CAPTCHA.
Below is a sample demo showcasing Musashi analyzing EDR logs from Defender, successfully detecting Lumma Stealer delivered via a fake CAPTCHA attack.
When responding to security incidents, time is critical. Instead of manually querying an endpoint for suspicious activity, you can quickly dump endpoint logs (such as EDR logs) and use Musashi to efficiently analyze them for threat detection and IOC extraction—helping you identify potential threats in seconds.
- Extract logs from the endpoint’s EDR solution (e.g., Defender, CarbonBlack, Cortex).
- Run Musashi on the logs to apply SIGMA rules and detect potential threats.
- Extract IOCs (IPs, domains, hashes) for further investigation.
- Quickly determine if the endpoint is compromised—without manually searching through logs.
- Rapid Log Triage – Quickly process logs for threat detection
- SIGMA Rule Matching – Identify malicious activity based on SIGMA queries
- DL Anomaly Detection – Use deep learning with Autoencoders and Isolation Forest to find anomalies
- IOC Extraction – Extract IPs, domains, file hashes, and other indicators
- Log Slicing – Splits logs into SIGMA query results and extracted IOCs for easy analysis
-
Clone the repository:
git clone https://github.com/aj-tap/musashi cd musashi
-
Install dependencies:
pip install -r requirements.txt
python musashi.py -i /path/to/logs -o /path/to/output -lf defender
python musashi.py -i sample.evtx -o /output -lf winevtx -s sigma_rules/rules/windows/
Arguments
-i, --input_path → (Required) Path to the log directory
-o, --output_path → (Required) Path to the output directory for results
-s, --sigma_rule_path → Set Sigma rules directory or file path (If no specific Sigma rules directory or file path is set
-lf, --log_format → (Required) Log format (e.g., winevtx, azure, defender, cortex, carbonblack)
-a, --openai → (Optional) Supply openai api key to perform additional detections
After execution, Musashi provides:
- Detected threats based on SIGMA rules
- Log Anomalies result of DL.
- Extracted IOCs (IPs, domains, file hashes)
Contributions are welcome! Open an issue or submit a pull request.
Musashi is licensed under the GNU General Public License v3.0 (GPL-3.0).