Day 15 of #100DaysofYARA is all about named pipes! We'll be looking for both the \\.\pipe\ strings as well as common references to named and anonymous pipe methods and obfuscation methods. Lots malware fams use named pipes!
You may find a lot of PsExec (which may be unusual dependingon the env) in those pipes - if so, @matthewdunwoody has good advice on investigating / hunting the activity:
If traffic and Wireshark are more your thing, use the SMB Command & SMB Filename fields as columns in wireshark, and listen to NETRESEC for finding more evil: