All Products
Search
Document Center

Security Center:DescribeCloudSiemEventDetail

Last Updated:Sep 11, 2025

Retrieves the details of an event.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

yundun-sas:DescribeCloudSiemEventDetail

get

*All Resource

*

None None

Request parameters

Parameter

Type

Required

Description

Example

IncidentUuid

string

Yes

The UUID of the event.

85ea4241-798f-4684-a876-65d4f0c3****

RoleType

integer

No

The view type.

  • 0: the view of the current Alibaba Cloud account.

  • 1: the view of all accounts in your enterprise.

1

RoleFor

integer

No

The ID of the member account. An administrator can use this parameter to query data from the perspective of the member.

113091674488****

RegionId

string

No

The region of the data management center for Threat Analysis. Select the region where your assets are located. Valid values:

  • cn-hangzhou: assets in the Chinese mainland and China (Hong Kong)

  • ap-southeast-1: assets in regions outside the Chinese mainland

cn-hangzhou

Response elements

Element

Type

Description

Example

object

A PlainResponse object containing .

Data

object

The returned data.

123456

GmtCreate

string

The time when the event occurred.

2021-01-06 16:37:29

GmtModified

string

The time when the event was last updated.

2021-01-06 16:37:29

Aliuid

integer

The ID of the Alibaba Cloud account to which the event belongs.

127608589417****

AlertNum

integer

The number of alerts that are associated with the event.

4

AssetNum

integer

The number of assets that are associated with the event.

4

IncidentUuid

string

The globally unique ID of the event.

85ea4241-798f-4684-a876-65d4f0c3****

IncidentName

string

The name of the event.

Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc

IncidentNameEn

string

The English name of the event.

Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc

Description

string

The description of the event.

The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc

DescriptionEn

string

The English description of the event.

The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc

DataSources

array

The cloud services that generated the alerts associated with the event.

[sas,waf]

string

The cloud service that generated the alerts associated with the event.

[sas,waf]

ThreatLevel

string

The threat level. Valid values:

  • serious: high

  • suspicious: medium

  • remind: low

remind

ThreatScore

number

The threat score of the event. The score is a value from 0 to 100. A higher score indicates a higher threat level.

90.2

ExtContent

string

The extended information about the event, in JSON format.

{"event_transfer_type":"customize_rule"}

Status

integer

The status of the event. Valid values:

  • 0: unhandled

  • 1: handling

  • 5: handling failed

  • 10: handled

0

AttCkLabels

array

The ATT&CK technique labels.

["T1595.002 Vulnerability Scanning"]

string

The ATT&CK technique label.

["T1595.002 Vulnerability Scanning"]

AttckStages

array<object>

The attack stages.

object

TacticId

string

The ID of the ATT&CK tactic.

TA0008

TacticName

string

The name of the tactic.

Persistence

AlertNum

integer

The number of alerts that are associated with the tactic.

21

ReferAccount

string

The linked accounts.

17661858****/****,176618448****/****

IncidentType

string

The type of the event.

  • net-attack: Expert rule

  • graph: Graph computing

  • singleToSingle: Alert pass-through

  • allToSingle: Alert aggregation

graph

RuleId

string

The rule that is used to generate the event.

net-attack/101

Remark

string

The remarks for the event.

dealed

Success

boolean

Indicates whether the request was successful. Valid values:

  • true: The request was successful.

  • false: The request failed.

true

Code

integer

The response code.

200

Message

string

The returned message.

success

RequestId

string

The request ID.

9AAA9ED9-78F4-5021-86DC-D51C7511****

Examples

Success response

JSON format

{
  "Data": {
    "GmtCreate": "2021-01-06 16:37:29",
    "GmtModified": "2021-01-06 16:37:29",
    "Aliuid": 0,
    "AlertNum": 4,
    "AssetNum": 4,
    "IncidentUuid": "85ea4241-798f-4684-a876-65d4f0c3****",
    "IncidentName": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
    "IncidentNameEn": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
    "Description": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
    "DescriptionEn": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
    "DataSources": [
      "[sas,waf]"
    ],
    "ThreatLevel": "remind",
    "ThreatScore": 90.2,
    "ExtContent": "{\"event_transfer_type\":\"customize_rule\"}",
    "Status": 0,
    "AttCkLabels": [
      "[\"T1595.002 Vulnerability Scanning\"]"
    ],
    "AttckStages": [
      {
        "TacticId": "TA0008",
        "TacticName": "Persistence",
        "AlertNum": 21
      }
    ],
    "ReferAccount": "17661858****/****,176618448****/****",
    "IncidentType": "graph",
    "RuleId": "net-attack/101",
    "Remark": "dealed"
  },
  "Success": true,
  "Code": 200,
  "Message": "success",
  "RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****"
}

Error codes

HTTP status code

Error code

Error message

Description

500 InternalError The request processing has failed due to some unknown error.

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.