Retrieves a list of threat analysis events.
Try it now
Test
RAM authorization
|
Action |
Access level |
Resource type |
Condition key |
Dependent action |
|
yundun-sas:DescribeCloudSiemEvents |
list |
*All Resource
|
None | None |
Request parameters
|
Parameter |
Type |
Required |
Description |
Example |
| StartTime |
integer |
No |
The start time of the query. This value is a UNIX timestamp. Unit: milliseconds. |
1577808000000 |
| EndTime |
integer |
No |
The end time of the query. This value is a UNIX timestamp. Unit: milliseconds. |
1577808000000 |
| ThreadLevel |
array |
No |
The threat level of the event. The value is a JSON array. Valid values:
|
["serious","suspicious","remind"] |
|
string |
No |
The threat level of the event. The value is a JSON array. Valid values:
|
["remind","serious"] |
|
| EventName |
string |
No |
The name of the event. |
ECS unusual log in |
| IncidentUuid |
string |
No |
The event ID. |
85ea4241-798f-4684-a876-65d4f0c3**** |
| AssetId |
string |
No |
The ID of the asset that is associated with the event. |
6c740667-80b2-476d-8924-2e706feb**** |
| EntityUuid |
string |
No |
The UUID of the entity that is associated with the event. |
6c740667-80b2-476d-8924-2e706feb**** |
| Status |
integer |
No |
The status of the event. Valid values:
|
0 |
| OrderField |
string |
No |
The field to sort the event list by. Valid values:
|
ThreatScore |
| Order |
string |
No |
The sort order. Valid values:
|
desc |
| CurrentPage |
integer |
Yes |
The page number. The value must be greater than or equal to 1. |
1 |
| PageSize |
integer |
Yes |
The number of entries per page. The maximum value is 100. |
10 |
| RoleType |
integer |
No |
The view type.
|
1 |
| RoleFor |
integer |
No |
The ID of the member. The administrator can use this ID to view the data of the member. |
113091674488**** |
| RegionId |
string |
No |
The region where the Data Management center of Threat Analysis & Response is located. Select the region based on the region where your assets are located. Valid values:
|
cn-hangzhou |
Response elements
|
Element |
Type |
Description |
Example |
|
object |
PageResponse<List<SiemEvent>> |
||
| Success |
boolean |
Indicates whether the request was successful. Valid values:
|
true |
| Code |
integer |
The request status code. |
200 |
| Message |
string |
The message returned for the request. |
success |
| RequestId |
string |
The request ID. |
9AAA9ED9-78F4-5021-86DC-D51C7511**** |
| Data |
object |
The return value of the request. |
123456 |
| PageInfo |
object |
The pagination information. |
|
| CurrentPage |
integer |
The page number of the returned page. |
1 |
| PageSize |
integer |
The number of entries returned per page. |
10 |
| TotalCount |
integer |
The total number of entries. |
100 |
| ResponseData |
array<object> |
The detailed data. |
|
|
object |
|||
| GmtCreate |
string |
The time when the event occurred. |
2021-01-06 16:37:29 |
| GmtModified |
string |
The time when the event was last updated. |
2021-01-06 16:37:29 |
| Aliuid |
integer |
The ID of the Alibaba Cloud account to which the event belongs. |
127608589417**** |
| AlertNum |
integer |
The number of alerts that are associated with the event. |
4 |
| AssetNum |
integer |
The number of assets that are associated with the event. |
4 |
| IncidentUuid |
string |
The globally unique UUID of the event. |
85ea4241-798f-4684-a876-65d4f0c3**** |
| IncidentName |
string |
The name of the event. |
Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc |
| IncidentNameEn |
string |
The English name of the event. |
Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc |
| Description |
string |
The description of the event. |
The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc |
| DescriptionEn |
string |
The English description of the event. |
The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc |
| DataSources |
array |
The cloud services that generated the alerts, which are associated with the event. |
[sas,waf] |
|
string |
The cloud service that generated the alert, which is associated with the event. |
[sas,waf] |
|
| ThreatLevel |
string |
The threat level. Valid values:
|
remind |
| ThreatScore |
number |
The threat score of the event. The score ranges from 0 to 100. A higher score indicates a higher risk level. |
90.2 |
| ExtContent |
string |
The extended information about the event, in the JSON format. |
{"event_transfer_type":"customize_rule"} |
| Status |
integer |
The status of the event. Valid values:
|
0 |
| AttCkLabels |
array |
The tags of the ATT&CK attack technique. |
["T1595.002 Vulnerability Scanning"] |
|
string |
The tag of the ATT&CK attack technique. |
["T1595.002 Vulnerability Scanning"] |
|
| AttckStages |
array<object> |
The list of attack stages. |
|
|
object |
|||
| TacticId |
string |
The ID of the ATT&CK attack stage. |
TA0001 |
| TacticName |
string |
The name of the attack stage. |
Persistence |
| AlertNum |
integer |
The number of alerts that are associated with the attack stage. |
21 |
| ReferAccount |
string |
The linked account. |
127608589417**** |
| IncidentType |
string |
The event type.
|
graph |
| RuleId |
string |
The rule ID. |
crecr-21d7pogu9v4a**** |
| Remark |
string |
The remarks on the event. |
dealed |
Examples
Success response
JSON format
{
"Success": true,
"Code": 200,
"Message": "success",
"RequestId": "9AAA9ED9-78F4-5021-86DC-D51C7511****",
"Data": {
"PageInfo": {
"CurrentPage": 1,
"PageSize": 10,
"TotalCount": 100
},
"ResponseData": [
{
"GmtCreate": "2021-01-06 16:37:29",
"GmtModified": "2021-01-06 16:37:29",
"Aliuid": 0,
"AlertNum": 4,
"AssetNum": 4,
"IncidentUuid": "85ea4241-798f-4684-a876-65d4f0c3****",
"IncidentName": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
"IncidentNameEn": "Multiple type of alerts, including Miner Network, Command line download and run malicious files, Backdoor Process, etc",
"Description": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
"DescriptionEn": "The threat event contains 13 Miner Network,1 Execute suspicious encoded commands on Linux, etc",
"DataSources": [
"[sas,waf]"
],
"ThreatLevel": "remind",
"ThreatScore": 90.2,
"ExtContent": "{\"event_transfer_type\":\"customize_rule\"}",
"Status": 0,
"AttCkLabels": [
"[\"T1595.002 Vulnerability Scanning\"]"
],
"AttckStages": [
{
"TacticId": "TA0001",
"TacticName": "Persistence",
"AlertNum": 21
}
],
"ReferAccount": "127608589417****",
"IncidentType": "graph",
"RuleId": "crecr-21d7pogu9v4a****",
"Remark": "dealed"
}
]
}
}
Error codes
|
HTTP status code |
Error code |
Error message |
Description |
|---|---|---|---|
| 500 | InternalError | The request processing has failed due to some unknown error. |
See Error Codes for a complete list.
Release notes
See Release Notes for a complete list.