atomic-threat-coverage/data_needed/DN_0020_17_windows_sysmon_PipeEvent.yml
yugoslavskiy f278b6e4a0 - updated sysmon eid 1, 7, 17 and 18 (new fields)
- updated dn calculation to take enrichments to account
- updated dr class and template for both md and confluence to print enrichments (finally sigma has a rule with a link to our enrichment, I've submitted PR it a month ago)
- updated dr temlates for both md and confluence to be more verbose — if there is no info, we put some info messsage, not just empty field
2019-07-09 10:11:01 +03:00

53 lines
1.9 KiB
YAML

title: DN_0020_17_windows_sysmon_PipeEvent
description: >
This event generates when a named pipe is created. Malware often uses named
pipes for interprocess communication
loggingpolicy:
- LP_0009_windows_sysmon_PipeEvent
references:
- https://github.com/Cyb3rWard0g/OSSEM/blob/master/data_dictionaries/windows/sysmon/event-17.md
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=90017
category: OS Logs
platform: Windows
type: Applications and Services Logs
channel: Microsoft-Windows-Sysmon/Operational
provider: Microsoft-Windows-Sysmon
fields:
- EventID
- Computer
- Hostname # redundant
- EventType
- UtcTime
- ProcessGuid
- ProcessId
- PipeName
- Image
sample: |
- <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
- <System>
<Provider Name="Microsoft-Windows-Sysmon" Guid="{5770385F-C22A-43E0-BF4C-06F5698FFBD9}" />
<EventID>17</EventID>
<Version>1</Version>
<Level>4</Level>
<Task>17</Task>
<Opcode>0</Opcode>
<Keywords>0x8000000000000000</Keywords>
<TimeCreated SystemTime="2019-07-09T04:21:40.086214400Z" />
<EventRecordID>14921</EventRecordID>
<Correlation />
<Execution ProcessID="1540" ThreadID="3456" />
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
<Computer>atc-win-10</Computer>
<Security UserID="S-1-5-18" />
</System>
- <EventData>
<Data Name="RuleName" />
<Data Name="EventType">CreatePipe</Data>
<Data Name="UtcTime">2019-07-09 04:21:39.850</Data>
<Data Name="ProcessGuid">{717CFEC0-1651-5D24-0000-00109AFB3E00}</Data>
<Data Name="ProcessId">5624</Data>
<Data Name="PipeName">\mojo.5624.7020.12775972776436680360</Data>
<Data Name="Image">C:\Program Files (x86)\Google\Chrome\Application\chrome.exe</Data>
</EventData>
</Event>