Product
high
advisory
PowerShell Obfuscation via Concatenated Dynamic Command Invocation
2 rules 1 TTPThis rule detects PowerShell scripts that build commands from concatenated string literals within dynamic invocation constructs, a technique used by attackers to obscure execution intent, bypass keyword-based detections, and evade AMSI.
Elastic License v2
defense-evasion
powershell
obfuscation
2r
1t
high
advisory
Detecting RPC Traffic to the Internet
2 rules 2 TTPsThis brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.
Elastic License v2
network-traffic
initial-access
lateral-movement
rpc
2r
2t
high
advisory
Potential Machine Account Relay Attack via SMB
2 rules 2 TTPsThe rule identifies potential relay attacks against a machine account by detecting network share access events originating from a remote source IP but utilizing the target server's computer account, which may indicate an SMB relay attack.
Elastic License v2
credential-access
smb-relay
windows
2r
2t