Current ThreatQ Version Filter
 

Check Point SandBlast Operation

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The Check Point SandBlast operation enriches ThreatQ indicators with context obtained from the Check Point SandBlast API.

The operation provides the following actions:

  • Upload - uploads ThreatQ attachments to Check Point SandBlast for analysis.
  • Query - enriches ThreatQ objects using the returned JSON response.

The operation is compatible with ThreatQ attachments and indicators.  

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Operation option from the Type dropdown (optional).
  3. Click on the integration entry to open its details page.
  4. Enter the following parameter under the Configuration tab:
    Parameter Description
    API Key Your Check Point SandBlast API Key.
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

Actions

The operation provides the following actions:

Action Description Object Type Object Subtype
Upload Uploads ThreatQ objects Indicators Attachments
Query Enriches ThreatQ objects Indicators MD5, SHA-1, SHA-256, Attachments

Upload

Uploads ThreatQ attachments to Check Point SandBlast for analysis.

POST https://te.checkpoint.com/tecloud/api/v1/file/upload

Sample Response:

{
    "response": {
        "status": {
            "code": 1002,
            "label": "UPLOAD_SUCCESS",
            "message": "The file was uploaded successfully."
        },
        "sha1": "86bb5ed57999602fc4540ace6086a891c996e3f3",
        "md5": "010cfb902cae00576e39556914eb7af5",
        "sha256": "c79ac8a613c7a25793b2a0167d48a6a5e8e7c811ccdaf01d0a47efc7dff99dbd",
        "file_type": "",
        "file_name": "0.exe.zip",
        "features": [
            "te",
            "av",
            "extraction"
        ],
        "te": {
            "trust": 0,
            "images": [
                {
                    "report": {
                        "verdict": "unknown"
                    },
                    "status": "not_found",
                    "id": "e50e99f3-5963-4573-af9e-e3f4750b55e2",
                    "revision": 1
                },
                {
                    "report": {
                        "verdict": "unknown"
                    },
                    "status": "not_found",
                    "id": "5e5de275-a103-4f67-b55b-47532918fa59",
                    "revision": 1
                }
            ],
            "score": -2147483648,
            "status": {
                "code": 1002,
                "label": "UPLOAD_SUCCESS",
                "message": "The file was uploaded successfully."
            }
        },
        "extraction": {
            "method": "pdf",
            "tex_product": false,
            "status": {
                "code": 1002,
                "label": "UPLOAD_SUCCESS",
                "message": "The file was uploaded successfully."
            }
        },
        "av": {
            "status": {
                "code": 1002,
                "label": "UPLOAD_SUCCESS",
                "message": "The file was uploaded successfully."
            }
        }
    }
}

ThreatQ provides the following default mapping for this Action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.response.sha1 Indicator.Value SHA-1 86bb5ed57999602fc4540ace6
086a891c996e3f3
N/A
.response.sha256 Indicator.Value SHA-256 c79ac8a613c7a25793b2a0167
d48a6a5e8e7c811ccdaf01d0a4
7efc7dff99dbd
N/A
.response.md5 Indicator.Value MD5 010cfb902cae00576e39556914e
b7af5
N/A

Query

The Query action enriches ThreatQ objects using the returned JSON response.

POST https://te.checkpoint.com/tecloud/api/v1/file/query

Sample Response:

{
    "response": [
        {
            "status": {
                "code": 1001,
                "label": "FOUND",
                "message": "The request has been fully answered."
            },
            "md5": "6573cd9789c3fe1be39c3cc595e64942",
            "file_type": "",
            "file_name": "",
            "features": [
                "te",
                "av",
                "extraction"
            ],
            "te": {
                "trust": 10,
                "images": [
                    {
                        "report": {
                            "verdict": "benign"
                        },
                        "status": "found",
                        "id": "e50e99f3-5963-4573-af9e-e3f4750b55e2",
                        "revision": 1
                    },
                    {
                        "report": {
                            "verdict": "benign"
                        },
                        "status": "found",
                        "id": "5e5de275-a103-4f67-b55b-47532918fa59",
                        "revision": 1
                    }
                ],
                "score": -2147483648,
                "combined_verdict": "benign",
                "status": {
                    "code": 1001,
                    "label": "FOUND",
                    "message": "The request has been fully answered."
                }
            },
            "av": {
                "malware_info": {
                    "signature_name": "",
                    "malware_family": 0,
                    "malware_type": 0,
                    "severity": 0,
                    "confidence": 0
                },
                "status": {
                    "code": 1001,
                    "label": "FOUND",
                    "message": "The request has been fully answered."
                }
            },
            "extraction": {
                "method": "pdf",
                "extract_result": "CP_EXTRACT_RESULT_SUCCESS",
                "extracted_file_download_id": "eb727562-eb55-40ae-abf2-5c489bb871a7",
                "output_file_name": "applsci-09-04764-v2.cleaned.pdf",
                "time": "60.426",
                "extract_content": "PDF URI Actions",
                "extraction_data": {
                    "input_extension": "pdf",
                    "input_real_extension": "pdf",
                    "message": "OK",
                    "output_file_name": "applsci-09-04764-v2.cleaned.pdf",
                    "protection_name": "Potential malicious content extracted",
                    "protection_type": "Conversion to PDF",
                    "protocol_version": "1.0",
                    "risk": 3.0,
                    "scrub_activity": "Active content was found - PDF file was converted to PDF",
                    "scrub_method": "Convert to PDF",
                    "scrub_result": 0.0,
                    "scrub_time": "60.426",
                    "scrubbed_content": "PDF URI Actions"
                },
                "tex_product": false,
                "status": {
                    "code": 1001,
                    "label": "FOUND",
                    "message": "The request has been fully answered."
                }
            }
        }
    ]
}

ThreatQ provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.response[].file_type Indicator.Attribute File Type N/A N/A
.response[].file_name Indicator.Attribute File Name N/A N/A
.response[].te.trust Indicator.Attribute Trust 10 N/A
.response[].te.combined_verdict Indicator.Attribute Verdict Benign Title cased
.response[].av.malware_info.signature_name Indicator.Attribute Signature Name N/A N/A
.response[].av.malware_info.malware_family Indicator.Attribute Malware Family 0 N/A
.response[].av.malware_info.malware_type Indicator.Attribute Malware Type 0 N/A
.response[].av.malware_info.severity Indicator.Attribute Severity 0 N/A
.response[].av.malware_info.confidence Indicator.Attribute Confidence 0 N/A
.response[].extraction.extraction_data.risk Indicator.Attribute Risk 3.0 N/A

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
Check Point SandBlast Operation Guide v1.0.0 4.34.0 or Greater