A ttp may support one or more of the following functions:
It can be used to discover specific details to help you understand vulnerabilities and exploitability.
The technique is not standalone and depends on other techniques.
Maintain a certain level of access even after a reboot.
It can help redirect traffic to otherwise unreachable end-points.
Moving around to additional connected system normally in an internal network.
It can either exploit a vulnerability or leverage credentials to gain access.
It can help to gain a higher permission access level.
It can either exploit a vulnerability or leverage credentials to gain access.
It can help gain a bind or reverse connection to spawn an (psuedo-)interactive prompt for code execution.
This helps you download and uploads files.
This is a tip that can help you run through other TTPs a little more smartly.