Get link to uploaded file task report (Sandbox)

Expand all | Collapse all

The /sandbox/tasks/file/{task ID}/report/url endpoint is used to obtain the link to download the execution task results in Kaspersky Sandbox.

Request

Request method: GET

Endpoint: https://tip.kaspersky.com/api/sandbox/tasks/file/{task_id}/report/url

Query parameters:

Expected parameters

Parameter

Description

task_id

Object execution task ID.

section

Array of values separated by commas. Specifies JSON objects to include to the report.

Sections available both for Windows and Android environments:

  • all—All available JSON files and folders with images and screenshots are added to the report (default value).
  • categories—The categories.json file is added to the report.
  • detection-names—The detection-names.json file is added to the report.
  • downloaded-files-list (obsolete, left for compatibility) or transferred-files—The downloaded-files.json file is added to the report.
  • dropped-files or dropped-files-list (obsolete, left for compatibility)—The dropped-files.json file is added to the report.
  • pcap—The network-traffic.pcap file is added to the report.
  • publications—The publications.json file is added to the report.
  • sample-and-execution-properties—The sample-and-execution-properties.json file is added to the report.
  • screenshots—The folder with screenshots is added to the report.
  • traffic-report—The network-traffic.json file is added to the report.
  • triggered-network-rules—The triggered-network-rules.json file is added to the report.

     

Sections available for Windows environments only:

  • container-files—The sample-content.json file is added to the report.
  • file-operations—The file-operations.json file is added to the report.
  • loaded-pe—The loaded-pe-images.json file is added to the report.
  • mitre-matrix—The matrix.json file is added to the report.
  • process-operations—The process-operations.json file is added to the report.
  • registry-operations—The registry-operations.json file is added to the report.
  • suspicious-activities (obsolete, left for compatibility) or suspicious-activities-windows—The suspicious-activities.json file is added to the report.
  • synchronize-operations—The synchronize-operations.json file is added to the report.

     

Sections available for Android environments only:

  • bundle-images—The folder with bundle images is added to the report.
  • bundle-items—The static-bundle.json file is added to the report.
  • components—The static-component.json file is added to the report.
  • dumps—The dumps.json file is added to the report.
  • manifest—The manifest.zip file is added to the report.
  • modules—The static-modules.json file is added to the report.
  • permissions—The static-permissions.json file is added to the report.
  • suspicious-activities-android—The suspicious-activities-android.json file is added to the report.

For more detail about an object execution results in JSON format, refer to Exporting execution results to JSON archive.

Request example:

1. To get a link to an archive that contains task results for the uploaded and executed file:

curl -u <user name> --cert <full path to the certificate on your computer> -X GET 'https://tip.kaspersky.com/api/sandbox/tasks/file/<task ID>/report/url?section=all'

2. To download task results (archive) from the received link:

curl.exe -v --http1.1 -k --cert 'full path to the certificate on your computer' --user <user name> 'link to the archive' > <full path and name of the .zip archive where you want to save the task results>

Responses

200 OK

401 Unauthorized

403 Forbidden

404 Not Found

451 Unavailable For Legal Reasons

Page top