Peter is right, there would be no useable way to represent it in SAML metadata, but we've certainly taken advantage of the fact that using SimpleSAML as an IdP Proxy, with a variation on the MultiAuth module, it has "virtual SSO endpoints" in the sense that you can tell the SP the endpoint is the standard endpoint with an added "source=whatever" argument to it. That source argument is then available to tie back to a specific authn source, and avoid discovery. But in all cases, the IdP has just one entityID. But you can't list those "virtual endpoints" in SAML metadata, because you'd just have a bunch of say SAML2 POST SSO endpoints, and an SP wouldn't have any way of knowing which to use. Yon can only list the "unadorned SAML2 POST endpoint" in the metadata.
But for services where they just have you configure the SSO endpoint, instead of deriving it from the SAML metadata, then you can just tell it that the endpoint is .../saml2/idp/SSOService.php?source=XXXXX
You could, of course, change that query argument or do it with added PATH info, as long as you write the code to do something with that. We have done it with "../saml2/idp/SSOService.php/XXXXX" also, where again, the XXXXX told us the authn source "on the other side of the Proxy" we were to use.