All Products
Search
Document Center

Security Center:DescribeCloudSiemEvents

Last Updated:Oct 09, 2025

Retrieves a list of threat analysis events.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

yundun-sas:DescribeCloudSiemEvents

list

*All Resource

*

None None

Request parameters

Parameter

Type

Required

Description

Example

StartTime

integer

No

The start time of the query. This value is a UNIX timestamp. Unit: milliseconds.

1577808000000

EndTime

integer

No

The end time of the query. This value is a UNIX timestamp. Unit: milliseconds.

1577808000000

ThreadLevel

array

No

The threat level of the event. The value is a JSON array. Valid values:

  • serious: high

  • suspicious: medium

  • remind: low

["serious","suspicious","remind"]

string

No

The threat level of the event. The value is a JSON array. Valid values:

  • serious: high

  • suspicious: medium

  • remind: low

["remind","serious"]

EventName

string

No

The name of the event.

ECS unusual log in

IncidentUuid

string

No

The event ID.

85ea4241-798f-4684-a876-65d4f0c3****

AssetId

string

No

The ID of the asset that is associated with the event.

6c740667-80b2-476d-8924-2e706feb****

EntityUuid

string

No

The UUID of the entity that is associated with the event.

6c740667-80b2-476d-8924-2e706feb****

Status

integer

No

The status of the event. Valid values:

  • 0: unhandled

  • 1: in progress

  • 5: failed

  • 10: handled

0

OrderField

string

No

The field to sort the event list by. Valid values:

  • GmtModified: Sorts by modification time. This is the default value.

  • ThreatScore: Sorts by threat score.

ThreatScore

Order

string

No

The sort order. Valid values:

  • desc: descending

  • asc: ascending

desc

CurrentPage

integer

Yes

The page number. The value must be greater than or equal to 1.

1

PageSize

integer

Yes

The number of entries per page. The maximum value is 100.

10

RoleType

integer

No

The view type.

  • 0: The view of the current Alibaba Cloud account.

  • 1: The view of all accounts that are managed by the administrator account.

1

RoleFor

integer

No

The ID of the member. The administrator can use this ID to view the data of the member.

113091674488****

RegionId

string

No

The region where the Data Management center of Threat Analysis & Response is located. Select the region based on the region where your assets are located. Valid values:

  • cn-hangzhou: Your assets are in the Chinese mainland or China (Hong Kong).

  • ap-southeast-1: Your assets are in regions outside China.

cn-hangzhou

Response elements

Element

Type

Description

Example

object

PageResponse<List<SiemEvent>>

Success

boolean

Indicates whether the request was successful. Valid values:

  • true: successful

  • false: failed

true

Code

integer

The request status code.

200

Message

string

The message returned for the request.

success

RequestId

string

The request ID.

9AAA9ED9-78F4-5021-86DC-D51C7511****

Data

object

The return value of the request.

123456

PageInfo

object

The pagination information.

CurrentPage

integer

The page number of the returned page.

1

PageSize

integer

The number of entries returned per page.

10

TotalCount

integer

The total number of entries.

100

ResponseData

array<object>

The detailed data.

object

GmtCreate

string

The time when the event occurred.

2021-01-06 16:37:29

GmtModified

string

The time when the event was last updated.

2021-01-06 16:37:29

Aliuid

integer

The ID of the Alibaba Cloud account to which the event belongs.

127608589417****

AlertNum

integer

The number of alerts that are associated with the event.

4

AssetNum

integer

The number of assets that are associated with the event.

4

IncidentUuid

string

The globally unique UUID of the event.

85ea4241-798f-4684-a876-65d4f0c3****

IncidentName

string

The name of the event.

Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc

IncidentNameEn

string

The English name of the event.

Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc

Description

string

The description of the event.

The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc

DescriptionEn

string

The English description of the event.

The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc

DataSources

array

The cloud services that generated the alerts, which are associated with the event.

[sas,waf]

string

The cloud service that generated the alert, which is associated with the event.

[sas,waf]

ThreatLevel

string

The threat level. Valid values:

  • serious: high

  • suspicious: medium

  • remind: low

remind

ThreatScore

number

The threat score of the event. The score ranges from 0 to 100. A higher score indicates a higher risk level.

90.2

ExtContent

string

The extended information about the event, in the JSON format.

{"event_transfer_type":"customize_rule"}

Status

integer

The status of the event. Valid values:

  • 0: unhandled

  • 1: in progress

  • 5: failed

  • 10: handled

0

AttCkLabels

array

The tags of the ATT&CK attack technique.

["T1595.002 Vulnerability Scanning"]

string

The tag of the ATT&CK attack technique.

["T1595.002 Vulnerability Scanning"]

AttckStages

array<object>

The list of attack stages.

object

TacticId

string

The ID of the ATT&CK attack stage.

TA0001

TacticName

string

The name of the attack stage.

Persistence

AlertNum

integer

The number of alerts that are associated with the attack stage.

21

ReferAccount

string

The linked account.

127608589417****

IncidentType

string

The event type.

  • net-attack: expert rule

  • graph: graph computing

graph

RuleId

string

The rule ID.

crecr-21d7pogu9v4a****

Remark

string

The remarks on the event.

dealed

Examples

Success response

JSON format

{
  "Success": true,
  "Code": 200,
  "Message": "success",
  "RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****",
  "Data": {
    "PageInfo": {
      "CurrentPage": 1,
      "PageSize": 10,
      "TotalCount": 100
    },
    "ResponseData": [
      {
        "GmtCreate": "2021-01-06 16:37:29",
        "GmtModified": "2021-01-06 16:37:29",
        "Aliuid": 0,
        "AlertNum": 4,
        "AssetNum": 4,
        "IncidentUuid": "85ea4241-798f-4684-a876-65d4f0c3****",
        "IncidentName": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
        "IncidentNameEn": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
        "Description": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
        "DescriptionEn": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
        "DataSources": [
          "[sas,waf]"
        ],
        "ThreatLevel": "remind",
        "ThreatScore": 90.2,
        "ExtContent": "{\"event_transfer_type\":\"customize_rule\"}",
        "Status": 0,
        "AttCkLabels": [
          "[\"T1595.002 Vulnerability Scanning\"]"
        ],
        "AttckStages": [
          {
            "TacticId": "TA0001",
            "TacticName": "Persistence",
            "AlertNum": 21
          }
        ],
        "ReferAccount": "127608589417****",
        "IncidentType": "graph",
        "RuleId": "crecr-21d7pogu9v4a****",
        "Remark": "dealed"
      }
    ]
  }
}

Error codes

HTTP status code

Error code

Error message

Description

500 InternalError The request processing has failed due to some unknown error.

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.