TIER 1 — INTERACTIVE SHELLS
MITRE ATT&CK: T1059
When a human pastes a prompt response into a shell, it leaves artifacts no human would have produced unaided. Tier 1 watches interactive shells — PowerShell, cmd, bash, pwsh, Windows Terminal — for those artifacts.
The question Tier 1 asks: did a human write this, or did a human paste this?
TIER 2 — RMM HIJACK DETECTION
MITRE ATT&CK: T1219, T1003, T1562, T1021, T1078
Modern ransomware affiliates don't deploy custom tooling — they hijack the customer's own remote management software. Tier 2 monitors 47 RMM and remote-administration tools across the major vendors for the behavioral inflection that separates legitimate maintenance from operator takeover.
The question Tier 2 asks: is the RMM doing its job, or is someone else doing a job through the RMM?
LOLBIN HYBRID
MITRE ATT&CK: T1218, T1105
Living-off-the-land binaries — certutil, regsvr32, mshta, rundll32, schtasks — are how modern adversaries avoid dropping malware that would get caught. AAAD runs both Tier 1 and Tier 2 heuristics against LOLBin execution and requires a tactical signal before alerting. No alerts on Windows just doing its job. Alerts when something else is doing a job through Windows.
The question the LOLBin tier asks: is this Microsoft, or is something wearing Microsoft as a costume?