Related Projects

ICS Watch Dog stands on the shoulders of several excellent projects in the Sysmon and ATT&CK community. This page acknowledges them and explains when each is appropriate alongside or instead of ICS Watch Dog.

Microsoft Sysinternals Sysmon

Sysmon is the Windows system service and device driver that everything else in this ecosystem depends on. Without Sysmon, none of this works. Mark Russinovich and Thomas Garnier deserve credit for building and maintaining it.

ICS Watch Dog provides Sysmon configuration files. Sysmon itself must be downloaded separately from Microsoft.

SwiftOnSecurity sysmon-config

SwiftOnSecurity/sysmon-config is the most widely deployed Sysmon configuration in the world. It is the foundational reference that introduced many of the patterns ICS Watch Dog uses. The current version (v74) targets enterprise IT environments and was last updated in 2021-07-08.

ICS Watch Dog ships an unmodified copy of v74 in sysmon-configs/reference/ for learning and comparison. ICS Watch Dog's curated configs are built independently and add ICS/OT-specific monitoring that SwiftOnSecurity does not address.

When to Use SwiftOnSecurity

When to Use ICS Watch Dog Instead

olafhartong/sysmon-modular

olafhartong/sysmon-modular by Olaf Hartong is the inspiration for ICS Watch Dog's module library architecture and the structured ATT&CK rule tagging convention. sysmon-modular targets enterprise IT environments and provides a much larger module catalog than ICS Watch Dog (200+ modules) plus a sophisticated PowerShell merge framework.

When to Use sysmon-modular

When to Use ICS Watch Dog Instead

Compatibility

ICS Watch Dog's ATT&CK tagging convention is a strict superset of sysmon-modular's format. SIEM parsers written for sysmon-modular work on ICS Watch Dog tags with one minor change (rename the technique_name field to technique). Teams running both projects can normalize on either format. See the ATT&CK Rule Tagging page for details.

MITRE ATT&CK

MITRE ATT&CK is the canonical source for adversary technique IDs and names. ICS Watch Dog tags every detection rule with the ATT&CK technique it is designed to detect, using both the Enterprise matrix (T1xxx) for IT/host techniques and the ICS matrix (T0xxx) for industrial protocol and OT-specific techniques.

SANS ICS 5 Critical Controls

The SANS Five ICS Cybersecurity Critical Controls by Robert M. Lee provides the strategic framework that ICS Watch Dog configs are organized around. Every curated config maps to one or more of the five controls. See the SANS ICS 5 Controls page for details.

LOLRMM

LOLRMM (Living Off the Land Remote Monitoring and Management) is a community-maintained catalog of remote access and RMM tools commonly abused by threat actors. ICS Watch Dog's remote-access module library draws on the LOLRMM catalog for tool identification and detection patterns. CISA's AA23-025A advisory makes the case for monitoring all RMM tools by default.

Adversary Emulation Tools

For deeper validation of Sysmon detection coverage beyond the ICS Watch Dog efficacy test script, consider:

These tools generate richer adversary behavior than the ICS Watch Dog efficacy script, but require more setup and care when deploying in OT environments.

Sysmon Documentation and Community