Microsoft-Windows-Sysmon › Event 18

Event ID 18 — PipeEvent (Pipe Connected)

Provider
Microsoft-Windows-Sysmon
Channel
Operational
Level
Informational
Collection Priority
Recommended (Palantir, others)
Task
Pipe Connected (rule: PipeEvent)
Opcode
Info

Description

This event logs when a named pipe connection is made between a client and a server.

Message #

Pipe Connected:
RuleName: %1
EventType: %2
UtcTime: %3
ProcessGuid: %4
ProcessId: %5
PipeName: %6
Image: %7
User: %8

Fields #

NameDescription
RuleName UnicodeString → stringCustom tag mapped to event, i.e. ATT&CK technique ID
EventType UnicodeString → stringThe type of pipe event (ConnectPipe)
UtcTime UnicodeString → stringTime in UTC when event was created
ProcessGuid GUID → GUIDProcess GUID of the process that connected the pipe
ProcessId UInt32 → PIDProcess ID used by the OS to identify the process that connected the pipe
PipeName UnicodeString → stringName of the pipe connected
Image UnicodeString → stringFile path of the process that connected the pipe
User UnicodeString → stringThe name of the account that made a named pipe connection.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Sysmon",
    "guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9",
    "event_source_name": "",
    "event_id": 18,
    "version": 1,
    "level": 4,
    "task": 18,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2023-11-06T02:04:25.137463+00:00",
    "event_record_id": 1441110,
    "correlation": {},
    "execution": {
      "process_id": 7064,
      "thread_id": 9788
    },
    "channel": "Microsoft-Windows-Sysmon/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "event_data": {
    "RuleName": "-",
    "EventType": "ConnectPipe",
    "UtcTime": "2023-11-06 02:04:25.084",
    "ProcessGuid": "E56ADA26-17F7-6548-5800-000000000D00",
    "ProcessId": 4404,
    "PipeName": "\\wkssvc",
    "Image": "C:\\Windows\\system32\\wbem\\wmiprvse.exe",
    "User": "NT AUTHORITY\\NETWORK SERVICE"
  },
  "message": ""
}

Detection Patterns #

Named Pipe

23 rules

Sigma

Florian Roth (Nextron Systems)
Roberto Rodriguez @Cyb3rWard0g, Tim Shelton
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Show 13 more (16 total)
Nikita Nazarov, oscd.community, Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nikita Nazarov, oscd.community, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Wojciech Lesicki
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems)
Florian Roth (Nextron Systems), blueteam0ps, elhoim
Nasreddine Bencherchali (Nextron Systems)

Splunk

Teoderick Contreras, Splunk
Show 2 more (5 total)

Kusto Query Language

Microsoft Security Research

Named Pipe

19 rules

Sigma

Florian Roth (Nextron Systems), Wojciech Lesicki
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems)
Show 5 more (8 total)
Florian Roth (Nextron Systems), blueteam0ps, elhoim
Nikita Nazarov, oscd.community, Nasreddine Bencherchali (Nextron Systems)
Nikita Nazarov, oscd.community, Nasreddine Bencherchali (Nextron Systems)

Kusto Query Language

Microsoft Security Research

Named Pipe

15 rules

Sigma

Florian Roth (Nextron Systems), Wojciech Lesicki
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems)
Show 3 more (6 total)
Florian Roth (Nextron Systems), blueteam0ps, elhoim

Splunk

Teoderick Contreras, Splunk
Show 3 more (6 total)
Teoderick Contreras, Splunk

Named Pipe

13 rules

Sigma

Florian Roth (Nextron Systems), Wojciech Lesicki
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems)
Show 3 more (6 total)
Florian Roth (Nextron Systems), blueteam0ps, elhoim

Splunk

Teoderick Contreras, Splunk
Show 2 more (5 total)

Kusto Query Language

Microsoft Security Research

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Kusto Query Language # view in reference

  • ADFS Database Named Pipe Connection source medium: 'This detection uses Sysmon telemetry to detect suspicious local connections via a named pipe to the AD FS configuration database (Windows Internal Database). In order to use this query you need to be collecting Sysmon EventIdD 18 (Pipe Connected). If you do not have Sysmon data in your workspace this query will raise an error stating: Failed to resolve scalar expression named "[@Name]"'

References #