Lateral Tool Transfer
Adversaries may transfer tools or other files between systems in a compromised environment. Once brought into the victim environment (i.e., [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) files may then be copied from one system to another to stage adversary tools or other files over the course of an operation. Adversaries may copy files between internal victim systems to support lateral movement using inherent file sharing protocols such as file sharing over [SMB/Windows Ad...
BY SOURCE
PROCEDURES (15)
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 2 detections for anomal
Auto-extracted: 2 detections for service
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for file monitoring
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for lateral