Local Data Staging
Adversaries may stage collected data in a central location or directory on the local system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may be used, and common functionality within [cmd](https://attack.mitre.org/software/S0106) and bash may be used to copy data into a staging location. Adversaries may also stage collected data in vari...
BY SOURCE
PROCEDURES (6)
Auto-extracted: 3 detections for powershell
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for credential
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for suspicious