Get Industrial Threat Intelligence report

The ics/get_one endpoint is used to display specific information for an Industrial Threat Intelligence report, identified by publication_id.

Request

Request method: POST

Endpoint: https://tip.kaspersky.com/api/ics/get_one

Query parameters:

Expected parameters

Parameter

Description

publication_id

Industrial Threat Intelligence report ID: the id parameter (a string) returned by the get_list endpoint.

include_info

List of the optional parameters separated by comma:

all—All available formats.

pdf—Industrial Threat Intelligence report in PDF format.

execsum—Brief report summary for business purposes (executive summary) in PDF format.

yara—Industrial Threat Intelligence report in YARA Rules format.

iocs—OpenIOC file that includes description of indicators of compromise.

suricata—File that contains Suricata rules associated with the Industrial Threat Intelligence report.

lang

Language for an Industrial Threat Intelligence report. The value can be one of the following: ru (Russian), en (English), pt (Portuguese), or es (Spanish). A list of available languages for an Industrial Threat Intelligence report is returned by the pdfs in the get_list endpoint. If the lang parameter is not specified, an English version of the Industrial Threat Intelligence report will be returned.

Request example:

Retrieve the executive summary and the PDF report for the specific Industrial report:

curl -u <user_name> -H 'Content-Length: 0' --cert <full path to the certificate CERT_NAME.pem on your computer> -X POST 'https://tip.kaspersky.com/api/ics/get_one?publication_id={Industrial report ID}&include_info=execsum,pdf'

Responses

Click the links below for information about possible responses.

Expand all | Collapse all

200 OK

401 Unauthorized

403 Forbidden

451 Unavailable For Legal Reasons

See also:

Get Industrial Threat Intelligence report list

Get Master IOC

Get Master YARA

Page top