{ "type": "bundle", "id": "bundle--4abb5206-a01e-42f1-b77d-56ba4b60add7", "spec_version": "2.0", "objects": [ { "id": "x-mitre-tactic--97689bbd-d5c4-4293-bde7-f11750cea2ec", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "name": "Technical Weakness Identification", "description": "This object is deprecated as its content has been merged into the enterprise domain. Please see the [PRE](http://attack.mitre.org/matrices/enterprise/pre/) matrix for its replacement. The prior content of this page has been preserved [here](https://attack.mitre.org/versions/v7/tactics/TA0018/).\n\nTechnical weakness identification consists of identifying and analyzing weaknesses and vulnerabilities collected during the intelligence gathering phases to determine best approach based on technical complexity and adversary priorities (e.g., expediency, stealthiness).", "external_references": [ { "external_id": "TA0018", "url": "https://attack.mitre.org/tactics/TA0018", "source_name": "mitre-attack" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "x_mitre_shortname": "technical-weakness-identification", "type": "x-mitre-tactic", "modified": "2020-10-22T15:35:24.309Z", "created": "2018-10-17T00:14:20.652Z", "x_mitre_deprecated": true } ] }