An open API service indexing awesome lists of open source software.

https://github.com/nasbench/sedr-internals

Symantec EDR Internals
https://github.com/nasbench/sedr-internals

detection edr endpoint endpoint-detection-response internals sedr symantec windows

Last synced: 2 months ago
JSON representation

Symantec EDR Internals

Awesome Lists containing this project

README

        

# SEDR-Internals

This is a place where I put everything related to my research on Symantec EDR Internals. Currently it contains the following:

* **[Enrichment-Rules](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/Enrichment-Rules.txt)** : A list of Symantec EDR data enrichment rules with a short description for each.

* **[Heuristics](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/Heuristics.txt)** : A list of Symantec EDR heuristics signatures with a description for each. Plus an inclusion of the corresponding "threat.id" value for usage with Symantec EDR (SEDR) search queries.

* **[SONAR](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/SONAR.txt)** : A list of Symantec SONAR signatures with a description of each signature. Plus an inclusion of the corresponding "bash.virus_id" value for usage with Symantec EDR (SEDR) search queries.

* **[ATP-Rules-Regex](https://github.com/nasbench/SEDR-Internals/blob/main/Signatures/ATP-Rules-Regex.txt)** : A file that contains some example regular expressions used by SEDR to detect and enrich events.

## Blog

I wrote a couple of blog posts describing different component of SEDR which you can find here:

* **[Symantec EDR Internals — Criterion](https://nasbench.medium.com/symantec-edr-internals-criterion-fa49be4e21af)**
* **[Symantec EDR Internals — Event Enrichment Rules (Part I)](https://nasbench.medium.com/symantec-edr-internals-event-enrichment-rules-part-i-b5e4340041a7)**
* **[Forensic Artifacts — Symantec EDR “localdatastore” Folder](https://nasbench.medium.com/forensics-artifacts-symantec-edr-localdatastore-folder-9bff91d2876d)**
* **[Forensic Artifacts — Parsing Symantec EDR “localdatastore” LevelDB Files](https://nasbench.medium.com/forensics-artifacts-parsing-symantec-edr-localdatastore-leveldb-files-86f5c75736d5)**

## Tools

These are some of the tools I wrote that can help you understand a little bit about the internals of SEDR and how it works:

* **[sedr-localdatastore-parser](https://github.com/nasbench/sedr-localdatastore-parser)**