Data Source: Sysmon EventID 17

Sysmon EventID 17 logs details about the detection of a named pipe.

Property Value
Source XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sourcetype XmlWinEventLog
Separator EventID
+ Fields

            1
            _time
          
            3
            Channel
          
            5
            Computer
          
            7
            EventChannel
          
            9
            EventCode
          
            11
            EventData_Xml
          
            13
            EventDescription
          
            15
            EventID
          
            17
            EventRecordID
          
            19
            EventType
          
            21
            Guid
          
            23
            Image
          
            25
            Keywords
          
            27
            Level
          
            29
            Name
          
            31
            Opcode
          
            33
            PipeName
          
            35
            ProcessGuid
          
            37
            ProcessID
          
            39
            ProcessId
          
            41
            RecordID
          
            43
            RecordNumber
          
            45
            RuleName
          
            47
            SecurityID
          
            49
            SystemTime
          
            51
            System_Props_Xml
          
            53
            Task
          
            55
            ThreadID
          
            57
            TimeCreated
          
            59
            UserID
          
            61
            UtcTime
          
            63
            Version
          
            65
            action
          
            67
            date_hour
          
            69
            date_mday
          
            71
            date_minute
          
            73
            date_month
          
            75
            date_second
          
            77
            date_wday
          
            79
            date_year
          
            81
            date_zone
          
            83
            dest
          
            85
            dvc_nt_host
          
            87
            event_id
          
            89
            eventtype
          
            91
            host
          
            93
            id
          
            95
            index
          
            97
            linecount
          
            99
            os
          
            101
            pipe_name
          
            103
            process_exec
          
            105
            process_guid
          
            107
            process_id
          
            109
            process_name
          
            111
            process_path
          
            113
            punct
          
            115
            severity_id
          
            117
            signature
          
            119
            signature_id
          
            121
            source
          
            123
            sourcetype
          
            125
            splunk_server
          
            127
            tag
          
            129
            tag::eventtype
          
            131
            timeendpos
          
            133
            timestartpos
          
            135
            user_id
          
            137
            vendor_product
          
            139
            
          
...
not set
1<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>17</EventID><Version>1</Version><Level>4</Level><Task>17</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated SystemTime='2021-04-19T21:00:18.288457000Z'/><EventRecordID>162168</EventRecordID><Correlation/><Execution ProcessID='2816' ThreadID='2452'/><Channel>Microsoft-Windows-Sysmon/Operational</Channel><Computer>win-dc-982.attackrange.local</Computer><Security UserID='S-1-5-18'/></System><EventData><Data Name='RuleName'>-</Data><Data Name='EventType'>CreatePipe</Data><Data Name='UtcTime'>2021-04-19 21:00:18.288</Data><Data Name='ProcessGuid'>{761B69BB-EF62-607D-B211-00000000BA01}</Data><Data Name='ProcessId'>6960</Data><Data Name='PipeName'>\MSSE-1516-server</Data><Data Name='Image'>C:\Users\Administrator\Desktop\beacon.exe</Data></EventData></Event>

Source: GitHub | Version: 3