Loading

Registry fields

Elastic Stack Serverless

Fields related to Windows Registry operations.

Field Description Level
registry.data.bytes Original bytes written with base64 encoding.

For Windows registry operations, such as SetValueEx and RegQueryValueEx, this corresponds to the data pointed by lp_data. This is optional but provides better recoverability and should be populated for REG_BINARY encoded values.

type: keyword

example: ZQBuAC0AVQBTAAAAZQBuAAAAAAA=
extended
registry.data.strings Content when writing string types.

Populated as an array when writing string data to the registry. For single string registry types (REG_SZ, REG_EXPAND_SZ), this should be an array with one string. For sequences of string with REG_MULTI_SZ, this array will be variable length. For numeric data, such as REG_DWORD and REG_QWORD, this should be populated with the decimal representation (e.g "1").

type: wildcard

Note: this field should contain an array of values.

example: ["C:\rta\red_ttp\bin\myapp.exe"]
core
registry.data.type Standard registry type for encoding contents

type: keyword

example: REG_SZ
core
registry.hive Abbreviated name for the hive.

type: keyword

example: HKLM
core
registry.key Hive-relative path of keys.

type: keyword

example: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe
core
registry.path Full path, including hive, key and value

type: keyword

example: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe\Debugger
core
registry.value Name of the value written.

type: keyword

example: Debugger
core

The registry fields are expected to be nested at:

  • threat.enrichments.indicator.registry
  • threat.indicator.registry

Note also that the registry fields may be used directly at the root of the events.