{"id":13649509,"url":"https://github.com/Azure/SimuLand","last_synced_at":"2025-04-22T14:32:03.992Z","repository":{"id":46392019,"uuid":"355445496","full_name":"Azure/SimuLand","owner":"Azure","description":"Understand adversary tradecraft and improve detection strategies","archived":false,"fork":false,"pushed_at":"2023-03-09T19:10:33.000Z","size":45833,"stargazers_count":707,"open_issues_count":5,"forks_count":80,"subscribers_count":25,"default_branch":"main","last_synced_at":"2025-04-04T07:07:34.739Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"PowerShell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Azure.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":"SUPPORT.md","governance":null,"roadmap":null,"authors":null}},"created_at":"2021-04-07T07:04:41.000Z","updated_at":"2025-03-25T17:08:44.000Z","dependencies_parsed_at":"2024-01-07T13:07:10.294Z","dependency_job_id":null,"html_url":"https://github.com/Azure/SimuLand","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Azure%2FSimuLand","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Azure%2FSimuLand/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Azure%2FSimuLand/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Azure%2FSimuLand/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Azure","download_url":"https://codeload.github.com/Azure/SimuLand/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":250259095,"owners_count":21401040,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-02T02:00:17.856Z","updated_at":"2025-04-22T14:31:58.985Z","avatar_url":"https://github.com/Azure.png","language":"PowerShell","readme":"# SimuLand\n\u003e See the [announcement](https://www.microsoft.com/security/blog/2021/05/20/simuland-understand-adversary-tradecraft-and-improve-detection-strategies/) on the Microsoft Security Blog.\n\n\u003cp align=\"center\"\u003e\n  \u003ca href=\"#about\"\u003eAbout\u003c/a\u003e •\n  \u003ca href=\"#purpose\"\u003ePurpose\u003c/a\u003e •\n  \u003ca href=\"#structure\"\u003eStructure\u003c/a\u003e •\n  \u003ca href=\"#labs\"\u003eLabs\u003c/a\u003e •\n  \u003ca href=\"#contributing\"\u003eContributing\u003c/a\u003e •\n  \u003ca href=\"#trademarks\"\u003eTrademarks\u003c/a\u003e\n\u003c/p\u003e\n\n---\n\n## About\n\nSimuLand is an open-source initiative by Microsoft to help security researchers around the world deploy lab environments that reproduce well-known techniques used in real attack scenarios, actively test and verify effectiveness of related Microsoft 365 Defender, Azure Defender and Microsoft Sentinel detections, and extend threat research using telemetry and forensic artifacts generated after each simulation exercise. \n\nThese lab environments will provide use cases from a variety of data sources including telemetry from  Microsoft 365 Defender security products, Azure Defender and other integrated data sources through [Microsoft Sentinel data connectors](https://docs.microsoft.com/en-us/azure/sentinel/connect-data-sources#data-connection-methods).\n\n## Site: https://simulandlabs.com\n\n## Purpose\n\nAs we build out the SimuLand framework and start populating lab environments, we will be working under the following basic principles: \n\n* Understand the underlying behavior and functionality of adversary tradecraft\n* Identify mitigations and attacker paths by documenting preconditions for each attacker action\n* Expedite the design and deployment of threat research lab environments\n* Stay up-to-date with the latest techniques and tools used by real threat actors\n* Identify, document, and share relevant data sources to model and detect adversary actions\n* Validate and tune detection capabilities\n\n## Structure\n\n| Folder  | Description |\n|---------|-------------|\n| [Lab Environments](docs/environments/README.md) | Azure Resource Manager (ARM) Templates and documents to deploy lab environments. Some environments contributed through this initiative require at least a Microsoft 365 E5 license (paid or trial) and an Azure tenant. Depending on the lab guide being worked on, the design of the network environments might change a little. While some labs would replicate a hybrid cross-domain environment (on-prem -\u003e Cloud), others would focus only on resources in the cloud. |\n| [Lab Guides](docs/labs/README.md) | Step-by-step lab guides summarizing simulation scenarios. From a defensive perspective, simulation steps are also mapped to detection queries and alerts from Microsoft 365 Defender, Azure Defender, and Microsoft Sentinel. We believe this would help guide some of the extended threat research generated from the simulation exercise. |\n\n## Contributing\n\nThis project welcomes contributions and suggestions.  Most contributions require you to agree to a\nContributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us\nthe rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.\n\nWhen you submit a pull request, a CLA bot will automatically determine whether you need to provide\na CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions\nprovided by the bot. You will only need to do this once across all repos using our CLA.\n\nThis project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).\nFor more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or\ncontact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments.\n\n## Trademarks\n\nThis project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft \ntrademarks or logos is subject to and must follow \n[Microsoft's Trademark \u0026 Brand Guidelines](https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/usage/general).\nUse of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship.\nAny use of third-party trademarks or logos are subject to those third-party's policies.\n","funding_links":[],"categories":["Sorted by Technology and Category","Mobile"],"sub_categories":["Azure"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FAzure%2FSimuLand","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FAzure%2FSimuLand","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FAzure%2FSimuLand/lists"}