Rescan a downloaded file task (TAE)

Expand all | Collapse all

The /attribution/tasks/file_from_url/{task ID} endpoint is used to repeat a file execution task in Cloud Threat Attribution Engine.

When creating a rescan task, the file will be downloaded again.

Request

Request method: PUT

Endpoint: https://tip.kaspersky.com/api/attribution/tasks/file_from_url/{task_id}

Query parameters:

Expected parameters

Parameter

Description

task_id

Object execution task ID that you want to restart.

If necessary, you can change the object execution parameters. If the following parameters are not specified, previously specified values are used.

Optional expected parameters

Parameter

Description

url

Web address from which you want to download a file.

Required parameter.

file_ext

File extension for the object that is to be executed.

Must be specified without the dot, because it is added to the full object file name automatically. The value must not exceed 10 symbols.

processing_type

Object execution type. Available values:

exec-only—Object execution is performed.

unzip-and-exec—Object is unpacked before execution.

unzip_password

Password for an archived object.

This parameter is used only when processing_type = unzip-and-exec.

reset_similarity_thresholds

Specifies whether similarity thresholds for compared samples must be ignored. Available values:

true—Similarity thresholds are ignored.

false—Similarity thresholds are not ignored.

unpack

Specifies whether the contents of the executed file must be unpacked for analysis. Available values:

true—File will be unpacked.

false—File will not be unpacked.

Request example:

To rescan a downloaded and executed file:

curl -u <user name> --cert <full path to the certificate on your computer> -X PUT --header 'Content-Length: 0' 'https://tip.kaspersky.com/api/attribution/tasks/file_from_url/<task ID>'

Responses

200 OK

400 Bad Request

401 Unauthorized

403 Forbidden

404 Not Found

451 Unavailable For Legal Reasons

Page top