Take this wildly simplified example. You are the attacker. You already have access to internal systems at Microsoft.
Now you need to send the large amounts of data back to yourself, preferably without giving away your own location in the process. That’s the exfiltration phase of the cyber kill chain.
In order to do that, you’ve already established a set of listening posts and command/control sites across the internet. That’s your infrastructure. Setting that up in a pseudo anonymous way is hard, so you don’t do it often and may need to reuse it for multiple targets.
It’s that infrastructure that is hard to replicate if you’re trying to “look like” another threat actor on the Internet.