Retrieves the details of an event.
Try it now
Test
RAM authorization
|
Action |
Access level |
Resource type |
Condition key |
Dependent action |
|
yundun-sas:DescribeCloudSiemEventDetail |
get |
*All Resource
|
None | None |
Request parameters
|
Parameter |
Type |
Required |
Description |
Example |
| IncidentUuid |
string |
Yes |
The UUID of the event. |
85ea4241-798f-4684-a876-65d4f0c3**** |
| RoleType |
integer |
No |
The view type.
|
1 |
| RoleFor |
integer |
No |
The ID of the member account. An administrator can use this parameter to query data from the perspective of the member. |
113091674488**** |
| RegionId |
string |
No |
The region of the data management center for Threat Analysis. Select the region where your assets are located. Valid values:
|
cn-hangzhou |
Response elements
|
Element |
Type |
Description |
Example |
|
object |
A PlainResponse object containing |
||
| Data |
object |
The returned data. |
123456 |
| GmtCreate |
string |
The time when the event occurred. |
2021-01-06 16:37:29 |
| GmtModified |
string |
The time when the event was last updated. |
2021-01-06 16:37:29 |
| Aliuid |
integer |
The ID of the Alibaba Cloud account to which the event belongs. |
127608589417**** |
| AlertNum |
integer |
The number of alerts that are associated with the event. |
4 |
| AssetNum |
integer |
The number of assets that are associated with the event. |
4 |
| IncidentUuid |
string |
The globally unique ID of the event. |
85ea4241-798f-4684-a876-65d4f0c3**** |
| IncidentName |
string |
The name of the event. |
Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc |
| IncidentNameEn |
string |
The English name of the event. |
Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc |
| Description |
string |
The description of the event. |
The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc |
| DescriptionEn |
string |
The English description of the event. |
The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc |
| DataSources |
array |
The cloud services that generated the alerts associated with the event. |
[sas,waf] |
|
string |
The cloud service that generated the alerts associated with the event. |
[sas,waf] |
|
| ThreatLevel |
string |
The threat level. Valid values:
|
remind |
| ThreatScore |
number |
The threat score of the event. The score is a value from 0 to 100. A higher score indicates a higher threat level. |
90.2 |
| ExtContent |
string |
The extended information about the event, in JSON format. |
{"event_transfer_type":"customize_rule"} |
| Status |
integer |
The status of the event. Valid values:
|
0 |
| AttCkLabels |
array |
The ATT&CK technique labels. |
["T1595.002 Vulnerability Scanning"] |
|
string |
The ATT&CK technique label. |
["T1595.002 Vulnerability Scanning"] |
|
| AttckStages |
array<object> |
The attack stages. |
|
|
object |
|||
| TacticId |
string |
The ID of the ATT&CK tactic. |
TA0008 |
| TacticName |
string |
The name of the tactic. |
Persistence |
| AlertNum |
integer |
The number of alerts that are associated with the tactic. |
21 |
| ReferAccount |
string |
The linked accounts. |
17661858****/****,176618448****/**** |
| IncidentType |
string |
The type of the event.
|
graph |
| RuleId |
string |
The rule that is used to generate the event. |
net-attack/101 |
| Remark |
string |
The remarks for the event. |
dealed |
| Success |
boolean |
Indicates whether the request was successful. Valid values:
|
true |
| Code |
integer |
The response code. |
200 |
| Message |
string |
The returned message. |
success |
| RequestId |
string |
The request ID. |
9AAA9ED9-78F4-5021-86DC-D51C7511**** |
Examples
Success response
JSON format
{
"Data": {
"GmtCreate": "2021-01-06 16:37:29",
"GmtModified": "2021-01-06 16:37:29",
"Aliuid": 0,
"AlertNum": 4,
"AssetNum": 4,
"IncidentUuid": "85ea4241-798f-4684-a876-65d4f0c3****",
"IncidentName": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
"IncidentNameEn": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
"Description": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
"DescriptionEn": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
"DataSources": [
"[sas,waf]"
],
"ThreatLevel": "remind",
"ThreatScore": 90.2,
"ExtContent": "{\"event_transfer_type\":\"customize_rule\"}",
"Status": 0,
"AttCkLabels": [
"[\"T1595.002 Vulnerability Scanning\"]"
],
"AttckStages": [
{
"TacticId": "TA0008",
"TacticName": "Persistence",
"AlertNum": 21
}
],
"ReferAccount": "17661858****/****,176618448****/****",
"IncidentType": "graph",
"RuleId": "net-attack/101",
"Remark": "dealed"
},
"Success": true,
"Code": 200,
"Message": "success",
"RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****"
}
Error codes
|
HTTP status code |
Error code |
Error message |
Description |
|---|---|---|---|
| 500 | InternalError | The request processing has failed due to some unknown error. |
See Error Codes for a complete list.
Release notes
See Release Notes for a complete list.