File size: 1,630 Bytes
5fe70fd
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
{
    "type": "bundle",
    "id": "bundle--024a0c80-47a5-4b79-b113-e5aec2deb413",
    "spec_version": "2.0",
    "objects": [
        {
            "id": "x-mitre-tactic--2289489d-8824-42fb-8c94-411aca6f664c",
            "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
            "name": "Establish & Maintain Infrastructure",
            "description": "This object is deprecated as its content has been merged into the enterprise domain. Please see the [PRE](http://attack.mitre.org/matrices/enterprise/pre/) matrix for its replacement. The prior content of this page has been preserved [here](https://attack.mitre.org/versions/v7/tactics/TA0022/).\n\nEstablishing and maintaining infrastructure consists of building, purchasing, co-opting, and maintaining systems and services used to conduct cyber operations. An adversary will need to establish infrastructure used to communicate with and control assets used throughout the course of their operations.",
            "external_references": [
                {
                    "external_id": "TA0022",
                    "url": "https://attack.mitre.org/tactics/TA0022",
                    "source_name": "mitre-attack"
                }
            ],
            "object_marking_refs": [
                "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
            ],
            "x_mitre_shortname": "establish-&-maintain-infrastructure",
            "type": "x-mitre-tactic",
            "modified": "2020-10-22T15:37:16.235Z",
            "created": "2018-10-17T00:14:20.652Z",
            "x_mitre_deprecated": true
        }
    ]
}