Create a file upload and execution task (TAE)

Expand all | Collapse all

The /attribution/tasks/file endpoint is used to create in the Cloud Threat Attribution Engine a new execution task for an uploaded file.


Request method: POST


Query parameters:

Expected parameters




Object execution type.

This parameter is obsolete and left for backward compatibility with previous API versions only. The only value to be accepted is unzip-and-exec (object is unpacked before execution).


Object name. Required parameter.

Specify a file name, which Kaspersky Threat Intelligence Portal must use during execution in Kaspersky Sandbox. The specified file name will be assigned to the uploaded file or the file contained in the uploaded archive.

For correct processing of the file, do not specify its extension in the file_name parameter: Kaspersky Threat Intelligence Portal automatically determines the file type, and processes the file accordingly.

The value must not exceed 240 characters.


Specifies whether similarity thresholds for compared samples must be ignored. Available values:

true—Similarity thresholds are ignored.

false—Similarity thresholds are not ignored.


Specifies whether the contents of the executed file must be unpacked for analysis. Available values:

true—File will be unpacked.

false—File will not be unpacked.

Request example:

Upload and execute file:

curl -u <user name> --cert <full path to the certificate on your computer> -X POST -H 'Content-Type: application/octet-stream' --data-binary @'<path and file name>' '<file name>&processing_type=exec-only'


200 OK

400 Bad Request

401 Unauthorized

403 Forbidden

413 Payload Too Large (previously called "Request Entity Too Large")

451 Unavailable For Legal Reasons

Page top