A lightweight Python tool that enriches Windows command-line logs with security context to support SOC triage and incident investigations.
The tool focuses on explainability, adding analyst-friendly insights such as command category, MITRE ATT&CK mapping, risk level, and suggested next steps.
- Rule-based analysis of Windows command-line activity
- MITRE ATT&CK technique mapping
- Risk-based prioritization (Low / Medium / High)
- Analyst-focused investigation guidance
- CSV input and output (SIEM-friendly)
- No external dependencies
python cmdline_triage.py input.csv output.csvThe input CSV must contain the following columns:
Timestamp, Host, User, CommandLineThe output CSV preserves the original fields and adds:
- Category
- Explanation
- MITRE_Technique
- Risk_Level
- Analyst_Next_Step
- This tool is intended for SOC triage and analysis, not detection.
- Rules are evaluated top-down, and the first matching rule is applied.