Hunting with Elastic Security: Exfiltration over C2 channel