Skip to content

The Related Event object describes an OCSF event related to a finding.

uid

  • Type: string_t
  • Requirement: required

The unique identifier of the related OCSF event. This value must be equal to metadata.uid in the corresponding related event.

type_uid

  • Type: long_t
  • Requirement: recommended

The unique identifier of the related OCSF event type.

For example: 100701.

attacks

  • Type: attack
  • Requirement: optional

An array of MITRE ATT&CK® objects describing the tactics, techniques & sub-techniques identified by a security control or finding.

kill_chain

The Cyber Kill Chain® provides a detailed description of each phase and its associated activities within the broader context of a cyber attack.

observables

The observables associated with the event or a finding.

product_uid

  • Type: string_t
  • Requirement: optional

The unique identifier of the product that reported the related event.

type

  • Type: string_t
  • Requirement: optional

The type of the related event, as defined by type_uid.

For example: Process Activity: Launch.

type_name

  • Type: string_t
  • Requirement: optional

The type of the related OCSF event, as defined by type_uid.

For example: Process Activity: Launch.