AXIOM IR
Forensic Source Code

AXIOM IR

Multi-tenant AI forensic investigation workspace. Ingests evidence bundles, extracts IOCs, maps MITRE ATT&CK, renders a 3D attack graph, and generates AI-assisted case reports.

$2499

About this tool

AI-Powered Forensics & Incident Response Platform

AXIOM IR is a multi-tenant cyber investigation workspace for incident response teams. It ingests raw evidence bundles, normalises events into a common timeline, extracts indicators of compromise, and maps observed behaviour to MITRE ATT&CK — all inside one case workspace.

What Makes It Different

  • AI analyst chat answers questions against your actual uploaded evidence — not generic threat knowledge
  • 3D investigation graph renders entity relationships, attack paths, and kill-chain linkages visually
  • Forecast engine surfaces likely next-targets and patient-zero candidates so analysts act before the attacker moves
  • Full multi-tenant isolation — each organisation and case is completely walled off
  • Accepts raw text logs, CSV, JSON, and ZIP evidence bundles without pre-processing
  • Auto-generates case narrative reports with IOCs, MITRE mappings, and recommendations

Key Capabilities

  • Case creation and evidence upload with normalised event ingestion
  • IOC extraction and MITRE ATT&CK alignment
  • 3D investigation graph with entity and relationship metadata
  • Timeline, evidence, MITRE, audit, and AI chat views in one workspace
  • Forecast candidates: next targets and patient-zero identification
  • Role hierarchy: Master Admin → Tenant Admin → Investigator → Viewer

Screenshots