Παράδειγμα (απλοποιημένο)
Input: TTP T1059 (Command and Scripting) + IOC hash + scope: Windows endpoints
Output:
- Sigma (YAML): rule_id, logsource:win/sysmon, selection:process|cmd|powershell + condition
- KQL: DeviceProcessEvents ... summarize by 2m where count > threshold
- Suricata: alert http any any -> any any (msg:"DL of known hash"; filemd5; content:HASH)
- QRadar AQL: SELECT ... FROM events WHERE ...
MITRE: T1059.001, T1204 | Severity: High | FP Guidance: allowlist backup agents
*Γενικό δείγμα προς επίδειξη — προσαρμόζεται ανά περιβάλλον/πηγές logs.