{"id":42168,"date":"2021-08-05T16:00:44","date_gmt":"2021-08-05T16:00:44","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=95280"},"modified":"2021-08-05T16:00:44","modified_gmt":"2021-08-05T16:00:44","slug":"sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/","title":{"rendered":"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft"},"content":{"rendered":"<p>Last month, we introduced the <a href=\"https:\/\/github.com\/Azure\/SimuLand\" target=\"_blank\" rel=\"noopener\">SimuLand project<\/a> to help security researchers around the world deploy lab environments to reproduce well-known attack scenarios, actively test detections, and learn more about the underlying behavior and implementation of adversary techniques. Since the release of the project, we have worked on a second phase to improve the current documentation and collect the telemetry generated after running the simulation plans in the lab guides.<\/p>\n<p>Today, we are excited to release a dataset generated from the <a href=\"https:\/\/github.com\/Azure\/SimuLand\/tree\/main\/labs\/01_GoldenSAMLADFSMailAccess\" target=\"_blank\" rel=\"noopener\">first simulation scenario<\/a> to provide security researchers with an option to access data mapped to attack behavior without deploying the full environment.<\/p>\n<h2>Sharing SimuLand data to expedite research<\/h2>\n<p>In our previous blog post, we showed a basic threat research methodology and where the SimuLand project fits. One of the next steps after a simulation is the collection and analysis of the data generated. We believe we can help expedite the research process by sharing the security events generated during testing.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-95289\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/SimuLand-and-Security-Datasets.png\" alt=\"Map of a threat research methodology emphasizing SimuLand and Security Datasets.\" width=\"1434\" height=\"785\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/SimuLand-and-Security-Datasets.png 1434w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/SimuLand-and-Security-Datasets-300x164.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/SimuLand-and-Security-Datasets-1024x561.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/SimuLand-and-Security-Datasets-768x420.png 768w\" sizes=\"auto, (max-width: 1434px) 100vw, 1434px\"><\/p>\n<p><em>Figure 1: Map of a threat research methodology emphasizing SimuLand and Security Datasets.<\/em><\/p>\n<h3>What security events?<\/h3>\n<p>The data that you could collect from a SimuLand scenario depends on the adversary tradecraft simulated and the security controls in place. Based on the <a href=\"https:\/\/github.com\/Azure\/SimuLand\/tree\/main\/labs\/01_GoldenSAMLADFSMailAccess\" target=\"_blank\" rel=\"noopener\">first simulation scenario<\/a>, these are some of the security events you can collect and map to adversary behavior:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-95295\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Adver-Techniques.png\" alt=\"Adversarial techniques mapped to sources of data.\" width=\"852\" height=\"671\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Adver-Techniques.png 852w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Adver-Techniques-300x236.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Adver-Techniques-768x605.png 768w\" sizes=\"auto, (max-width: 852px) 100vw, 852px\"><\/p>\n<p><em>Figure 2: Adversarial techniques mapped to sources of data.<\/em><\/p>\n<h3>How are security events collected?<\/h3>\n<p>Security events generated during a simulation can be collected using the following APIs:<\/p>\n<h3>Where can I download the dataset from?<\/h3>\n<p>Rather than creating a new GitHub repository and storing all the security events generated, we are contributing every single dataset to the <a href=\"https:\/\/github.com\/OTRF\/Security-Datasets\" target=\"_blank\" rel=\"noopener\">GitHub repository<\/a> of the <a href=\"https:\/\/securitydatasets.com\/introduction.html\" target=\"_blank\" rel=\"noopener\">Security Datasets project<\/a>. This is a community-driven effort developed to share pre-recorded datasets with the Information Security (InfoSec) community to expedite data analysis and threat research. This is another open-source initiative created and maintained by the <a href=\"https:\/\/twitter.com\/OTR_Community\" target=\"_blank\" rel=\"noopener\">Open Threat Research<\/a> community.<\/p>\n<p>You can find our <a href=\"https:\/\/aka.ms\/SimuLandDataset1\" target=\"_blank\" rel=\"noopener\">first dataset here<\/a>.<\/p>\n<h3>What can you do with the dataset?<\/h3>\n<p>Besides empowering security researchers to understand the underlying behavior of attack techniques, sharing a dataset also helps to:<\/p>\n<ul>\n<li>Expedite the development and validation of detection rules.<\/li>\n<li>Identify and validate a chain of events to model adversary behavior.<\/li>\n<li>Facilitate labeled and unlabeled data for initial research and feature development.<\/li>\n<li>Automate simulation exercises by injecting pre-recorded events into data pipelines.<\/li>\n<li>Complement training material and expedite the creation of data analysis use cases.<\/li>\n<li>Expedite the creation of internal or community events, such as capture-the-flag or hackathons, where the data is used to create challenges and encourage collaboration.<\/li>\n<\/ul>\n<h2>What\u2019s next<\/h2>\n<p>With this <a href=\"https:\/\/aka.ms\/SimuLandDataset1\" target=\"_blank\" rel=\"noopener\">first dataset<\/a>, we commit ourselves to release the security events we generate in our lab environment along with new lab guides. We also hope you can help us identify new sources of data to improve the project and data collection strategy.<\/p>\n<h2>Learn more<\/h2>\n<p>To learn more about this open-source initiative, visit the <a href=\"https:\/\/github.com\/Azure\/SimuLand\" target=\"_blank\" rel=\"noopener\">SimuLand GitHub repository<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/05\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, we introduced the SimuLand project to help security researchers around the world deploy lab environments to reproduce well-known attack scenarios, actively test detections, and learn more about the underlying behavior and implementation of adversary techniques. Today, we are excited to release a dataset generated from the first simulation scenario to provide security researchers with an option to access data mapped to attack behavior without deploying the full environment.<br \/>\nThe post Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42169,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-42168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-05T16:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1434\" \/>\n\t<meta property=\"og:image:height\" content=\"785\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft\",\"datePublished\":\"2021-08-05T16:00:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/\"},\"wordCount\":545,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/\",\"name\":\"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png\",\"datePublished\":\"2021-08-05T16:00:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png\",\"width\":1434,\"height\":785},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/","og_locale":"en_US","og_type":"article","og_title":"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-05T16:00:44+00:00","og_image":[{"width":1434,"height":785,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft","datePublished":"2021-08-05T16:00:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/"},"wordCount":545,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/","url":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/","name":"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png","datePublished":"2021-08-05T16:00:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft.png","width":1434,"height":785},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sharing-the-first-simuland-dataset-to-expedite-research-and-learn-about-adversary-tradecraft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Sharing the first SimuLand dataset to expedite research and learn about adversary tradecraft"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42168"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42169"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}