In the most simplest form you only need to write a query (SQL/Splunk) and a tell the MDS how to map the resultant data back to nodes on the graph.
With the very basic knowledge of SQL/Splunk and Maltego you can almost immediately get massive insight into the most mundane of logs. With two (basic AF) Splunk-based transforms and three of the standard OSINT transforms that ship with Maltego we can spot fake Googlebots almost instantly in our web server logs:
Keep in mind that the power of the existing Threat Intelligence transforms available in the Transform Hub is at your fingertips - making it possible to enrich your internal data to the max.
If you are interested to test drive the MDS *today* you can simply email us at firstname.lastname@example.org and we'll send you the server as an OVA to experiment with. You can read the comprehensive documentation for the MDS [here] right now.
We love to get your feedback on our new project.
PS: the commercial people just told us we should include that we're going to be selling this in future. Don't know why that's important...but ye.