TL;DR — Stairwell AI Triage is a labeled feature inside the Stairwell platform. It analyzes a file’s structure, logic, and intent without executing it, and returns a plain-English explanation of what the file does. It runs in seconds. It does not detonate. It sits between a simple hash lookup (like VirusTotal) and full sandbox detonation. Some call it sandbox lite, but for many investigations, it eliminates the need for a sandbox entirely.
Key outputs from file analysis: TLDR summary, malicious likelihood score, confidence score, MITRE ATT&CK mapping, IOCs, prevalence signal, and recommended analyst actions.
Table of Contents
- What Is Stairwell AI Triage
- How AI Triage Works
- What is the AI Triage Report Output?
- The Prevalence Signal Explained
- Where AI Triage Sits in the Stack (vs. VirusTotal, Sandbox, EDR)
- When to Use AI Triage
- How AI Triage Benefits Each Security Role
- How AI Triage Trains Analysts Over Time
- Privacy and the Private Vault
- Frequently Asked Questions
1. What Is Stairwell AI Triage?
AI Triage is a Stairwell-coined capability and a labeled feature inside the Stairwell platform. It was built to answer the question every analyst asks when an alert fires: Is this file bad, and what does it do?
Traditional file analysis answers the first question and gives you a verdict. A thumbs up or a thumbs down. Stairwell AI Triage goes further and answers the second question and delivers the reasoning behind the verdict. It reads the file and writes a plain-English explanation of its structure, intent, and behavior, without ever executing it. Think of it as the step between a hash-look up (like VirusTotal) and detonating the file in a sandbox.
The name reflects what it does. It triages. It takes an unknown or suspicious file and produces enough structured output for an analyst to make a confident decision. AI Triage is cheaper and much quicker than using a sandbox. For many security analysts, AI Triage eliminates the need for a sandbox detonation in the majority of cases.
2. How AI Triage Works
AI Triage performs static analysis on the file itself. It is not a sandbox run nor a detonation. Instead, the file is read directly.
This matters because modern malware often actively evades and refuses to perform in sandbox environments. Instead it detects virtual machines. It waits. It needs user interaction. It uses conditional triggers. A sandbox can only tell you what a file does when it chooses to run. AI Triage tells you what the file is built to do, regardless of whether it ever runs.
To draw an analogy. If a file is the script of a play, a sandbox is the actual performance. A performance can change. A script cannot.
AI Triage reads the script of the play.
What does static analysis actually evaluate?
AI Triage analyzes each file across several dimensions:
- File structure and binary composition
- Imported libraries and system calls
- Code logic and execution pathways
- Embedded strings and command patterns
- Indicators of compromise
- Behavioral intent inferred from file design
The output is not raw data. It is synthesized by an LLM into a structured explanation an analyst can act on immediately.
How long does it take to invoke AI Triage?
Inside the Stairwell platform, when a file or alert is open, a “Run AI Triage” action is available. One click. Results in seconds.
3. What is the AI Triage Report Output?
This is where AI Triage is most different from other tools. It does not return a score in isolation. It returns a structured report an analyst can read and act on. Below is an alternative real example of the kind of output produced.

After the TL;DR, the full AI Triage report output includes the items below.

It also includes guidance. AI Triage does not just classify. It tells the analyst what to do next.

4. The Prevalence Signal Explained
Prevalence is one of the most important signals Stairwell uses to evaluate a file. It is worth understanding clearly.
Prevalence measures how often a file appears across the environment and across Stairwell’s global corpus. The logic is straightforward:
- A file seen on thousands of endpoints is probably a common application (think notepad.exe or a common system utility). High prevalence points toward benign.
- A file seen on one machine, included in no known malware feed, and nowhere else in any environment Stairwell has seen, is far more suspicious. Low prevalence is a threat signal.
Malware targeting a specific organization is often engineered to be unique. That uniqueness is detectable. Prevalence is one of the key techniques Stairwell uses to surface it.
This is also why Stairwell’s Private Vault matters here. Because every file from every endpoint is retained, Stairwell can calculate prevalence across the full history of the environment, not just what is on disk right now.
5. Where does AI Triage sit in the threat intelligence stack?
AI Triage occupies a deliberate position between two existing tools most security teams already use.
| Tool | What It Does | What It Misses |
|---|---|---|
| VirusTotal | Fast hash lookup. Returns detection ratios from vendor signatures. Tells you if something is known bad. | No explanation of behavior. No insight into what the file actually does. No understanding if this file is in your environment. |
| Stairwell AI Triage | Analyzes file structure and intent. Returns plain-English explanation, likelihood score, MITRE mapping, IOCs, and recommended actions. Runs in seconds without execution. Provides sufficient information and explanation for most security analysts. | Not a full detonation. For complex behavioral validation or live network traffic analysis, a sandbox may still be appropriate. |
| Sandbox (e.g., Joe Sandbox, Any.run) | Detonates the file in a container and observes live behavior. Detailed behavioral output when the malware cooperates. | Slow. Evasion-prone. Many modern malware samples detect sandbox environments and do nothing. Requires queuing and execution time. |
Security teams acknowledge that most investigations do not need a full sandbox run. AI Triage provides enough context to make a confident triage decision in the majority of cases. There are cases where a full detonation to see exactly what the file does and where it actually connects is valuable.
How does AI Triage compare to EDR?
EDR detects activity at runtime. It tells you when something executes on an endpoint and flags behavior that matches detection rules.
AI Triage tells you what a file is built to do, regardless of whether it has run yet. These are complementary capabilities, not competing ones.
- EDR catches execution as it happens.
- AI Triage explains the file before or after execution.
- Together: detection plus understanding, not one or the other.
EDR alerts are evidence of what happened. AI Triage reads the file before any behavior occurs.
6. When to Use AI Triage
AI Triage is most valuable in these scenarios:
An EDR alert fires and you need to know what you are dealing with
Hash lookup in VirusTotal returns nothing. Or it returns 2 of 70 detections, which tells you very little. AI Triage gives you a full breakdown of what the file does, why it is suspicious, and what to do next. In seconds.
A file is evasive in a sandbox
The sandbox detonates and sees nothing. The file stayed dormant. AI Triage reads the file directly and does not depend on execution. Evasion techniques are irrelevant to static analysis.
You are doing triage at volume
A threat intelligence feed delivers 50 new IOCs. You need to quickly assess which ones represent real risk to your environment. AI Triage gives you structured verdicts across all of them without manually reverse-engineering each file.
You need to communicate findings up the chain
MITRE ATT&CK mappings, extracted IOCs, and a plain-English TLDR make it easy to write incident reports, brief leadership, or document containment evidence. AI Triage produces that output automatically.
A file is new to your environment and low prevalence
Low prevalence combined with unusual structural signals is a strong indicator of a targeted threat. AI Triage surfaces that combination explicitly.
7. How AI Triage Benefits Each Security Role
SOC Analyst
You are triaging alerts. The question is always: is this real, and how bad is it? AI Triage answers both, immediately. You get the TLDR, the likelihood score, and the next steps without escalating, without queuing a sandbox, and without waiting. Faster triage. Fewer false escalations.
Threat Intelligence Analyst
You are working with IOCs, feeds, and malware reports. AI Triage helps you quickly assess file samples, extract structured IOCs for blocking, and map findings to MITRE ATT&CK. It turns a raw sample into usable intelligence in seconds. Output feeds directly into YARA rules, Run to Ground pivots, and Variant Discovery.
Incident Responder
You need to prove containment. AI Triage gives you defensible, documented analysis of every file involved in an incident. MITRE mappings, IOC extractions, and guidance are already structured. The Private Vault ensures you can analyze historical files, not just what is on disk right now. Containment is proven, not assumed.
8. How AI Triage Trains Analysts Over Time
Most detection tools give you a verdict. Pass or fail. Clean or malicious. They do not explain themselves.
AI Triage explains why. That explanation has a secondary benefit: it teaches your security team.
An analyst who runs AI Triage on 100s of files over three months learns things. They learn characteristics of files and understand typical features. They build pattern recognition that makes them faster and more accurate on the next alert.
This is not a side effect. It is a designed outcome. The goal is not just to give analysts answers. It is to make analysts better at finding answers themselves.
VirusTotal tells you a file is bad. AI Triage tells you why it is bad and what it does. Over time, that distinction in education compounds.
9. Privacy and the Private Vault
Every file analyzed by AI Triage stays in your Private Vault. It is not shared across tenants. It is not contributed to any public repository. It is not used to train a shared model.
This matters for two reasons.
First, operational security. When you investigate a malware sample using a public platform, the attacker can see that their file has been submitted. They know you found it. Stairwell’s private architecture removes that signal.
Second, historical analysis. Because every file is retained indefinitely, AI Triage can be run on files that were collected months or years ago. A new intelligence report drops today. You can run AI Triage against historical artifacts from previous incidents and immediately understand whether they are related. Retroactive analysis is built in.
Your environment. Your data. Your analysis. None of it leaves.
10. Frequently Asked Questions
Does AI Triage replace sandboxing?
For most triage decisions, yes. AI Triage provides enough context to determine what a file does, whether it is a threat, and what to do next, without detonation. Many investigations do not require a full sandbox run.
For scenarios where live behavioral validation is required, such as analyzing network traffic generated during execution, a sandbox may still be appropriate. AI Triage and sandbox tools are not mutually exclusive. But, the practical reality is that AI Triage eliminates the need for sandboxing in the majority of day-to-day triage cases.
When would I still use a sandbox?
Use a sandbox when you need to observe live network callbacks during execution, capture memory artifacts from an active process, or validate behavioral claims against a highly complex, multi-stage payload. AI Triage is the right first step. Sandbox detonation is the right next step when you need behavioral proof that static analysis cannot provide.
How accurate is AI Triage?
AI Triage returns both a malicious likelihood score and a confidence score. These are separate signals. High likelihood with high confidence means strong evidence. High likelihood with lower confidence flags ambiguity and prompts the analyst to dig further. The tool is transparent about what it knows and what it does not.
Accuracy improves over time as the underlying model is updated and as Stairwell’s Global Malware Corpus continues to grow.
Does Stairwell train on customer data?
No. Files stored in the Private Vault are not used to train large language models. Your data is used to analyze your environment. It is not pooled, shared, or contributed to Stairwell’s global corpus or any external dataset.
How does AI Triage integrate with EDR and SIEM?
AI Triage works alongside EDR, not as a replacement. EDR generates the alert. AI Triage provides the explanation. The structured output from AI Triage, including IOCs, MITRE mappings, and classifications, can be used to enrich SIEM data, inform response playbooks, and generate blocking rules.
Stairwell integrates with common security tools. Refer to the Integrations page for current connector details.
What file types does AI Triage support?
AI Triage supports any file that can execute or load into memory. This includes executables, libraries, scripts, Java archives, and installers across Windows, macOS, and Linux. For a complete list of supported file extensions, refer to the Stairwell Forwarder data sheet.
How fast is it?
Seconds. There are no detonation queues, no execution windows, and no environment setup. You click Run AI Triage and you get results. The speed is a function of the static analysis model, not a hardware or queue constraint.
Do I need to be an expert analyst to use it?
No. The output is written in plain English. A junior analyst can read an AI Triage result and understand what the file does, what it is classified as, and what to do next. The MITRE ATT&CK mapping and IOCs provide depth for senior analysts who want to dig further. The tool scales to both skill levels.
Is AI Triage a Stairwell-specific concept or a general industry term?
Stairwell coined it. AI Triage is a named capability and feature inside the Stairwell platform. The concept of AI-powered file triage exists broadly, but the specific capability, outputs, and positioning described here are Stairwell’s.
What happens to AI Triage results over time?
AI Triage is run-on-demand. Results are stored in the Private Vault alongside the file. Because Stairwell continuously reanalyzes files as new intelligence arrives, AI Triage findings can always be updated on-demand as the underlying model improves or as new malware feed data changes the context. A file that looked ambiguous last month may be classified with higher confidence today.