Cyber Threat Intelligence Report Template (+FREE Download) 

A cyber threat intelligence report template allows you and your team to create structured, standardized, consistent intelligence reports for your organization. Templates save valuable time and effort by reducing the strain the dissemination of intelligence puts on your CTI team. 

It is vital your CTI team has a standard template for sharing the intelligence you produce.  

To help you, we have created a comprehensive cyber threat intelligence report template you can use today! It includes everything you need to effectively share intelligence with your organization and report a cyber threat. Feel free to customize it to suit your organization’s needs.  

The complete cyber threat intelligence report template has been packaged and is now ready to use as a PDF or Word Document. Download and enjoy! 

CTI Report Template

Cyber Threat Intelligence Report Template

Report <Report Number/ID
Date  
Priority <Low / Moderate / High / Critical> 
Source and Information Reliability <Admiralty Scale Score [A-F][1-6]> 
Sensitivity <Report Sensitivity (TLP)> 

Executive Summary

A brief summary of the report. It should explain the report’s significance, create a simple, easy-to-follow narrative of its key findings, and support a single decision. The reader should be able to make an informed decision based entirely on this summary. 

Aim to answer the following questions concisely: 

  • What intelligence requirement(s) has this report fulfilled?  
  • Why is this report relevant to the organization?  
  • What is the biggest takeaway?  
  • What new intelligence has been provided?  
  • Does this report support or contradict existing assumptions, security initiatives, or objectives? 

Key Takeaways

A bulleted list of the key findings from this report. Aim to answer the following questions: 

  • Who is this report for?  
  • Where was the data collected (source)?  
  • Who was the attacker? 
  • Who was the victim?  
  • Why does this report matter to the target audience?  
  • What is the main takeaway from this report? 

This bulleted list is followed by a table summarizing key intelligence and a general analysis of the threat the report discusses using the Diamond Model. This allows key intelligence metrics to be easily identified and visualized.  

Intelligence Requirements Addressed <Citation of the IR addressed by this report
Data Sources  
Threat Actor <Primary threat actor (and aliases) or N/A or Unknown> 
Victim Location <Country of Victim
Sectors <Industry Targeted> 
Actor Motivation <Cybercrime / Espionage / Hacktivism / Ransomware / ICS / Other / Unknown> 
diamond model
Capabilities Adversary Infrastructure Victim 
<MITRE technique, malware, hacking tool> <Threat Actor, alias, email address, persona> <IP address, domain name, URL, C2 server> <company, workstation/server name, email address, > 
    
    

Intelligence Assessment

This section should include: 

  • A call to action, recommendation, or judgment: This threat (e.g., activity, threat actor, malware, etc.) demonstrates X and could potentially impact us. Therefore, we should do Y. 
  • Any new information: This threat has a new tool, capability, TTP, etc. 
  • Key evidence: The threat has the following characteristics that uniquely distinguish it. 
  • Estimative language (see Probability Matrix): “I assess with a <low/medium/high> level of certainty that < judgment> will impact us <impact>.”  
  • Background information: Any relevant background information about the threat actor, malware, TTP, etc., to give context to this new assessment. 
  • Relations to your organization: How does this threat relate to your organization? Does it target your country or sector? Does it target vulnerabilities in the systems or technologies you use? Does it relate to any previous security incidents or detections? 

This section should include a kill chain analysis technique like Lockheed Martin’s Cyber Kill Chain. List the IOCs or TTPs found at each stage of the attack to create an attack narrative for the reader. The security operations team can then use this to identify possible mitigations or gaps. 

Cyber Kill Chain 
S1: Reconnaissance  
S2: Weaponization  
S3: Delivery  
S4: Exploitation  
S5: Installation  
S6: Command & Control (C2)  
S7: Actions on Objectives  

Key Intelligence Gaps

A bulleted list that summarizes additional information the CTI team needs to complete their analysis and raise the confidence of the assessment. You should highlight gaps affecting the assessment, such as if new information is discovered or existing information is proven wrong.  

These gaps should be tracked externally from the report using a project/task management system. 

Indicators of Compromise (IOCs)

This section consists of IOCs found on endpoint devices (workstations, servers, mobile devices), in network logs, related malware, and any vulnerabilities relevant to the threat being discussed.  

Endpoint Artifacts

A list of any unique artifacts associated with the threat that can be found on endpoint devices through intrusion analysis. This includes process names, filenames, DLLs, registry keys, scheduled tasks, command lines, services, etc. Use the MITRE ATT&CK tactic for the Tactic column. 

Endpoint Artifact Type Description Tactic 
    
    
    

Network Artifacts

A list of any unique artifacts associated with the threat that can be found in network logs. This includes IP addresses, domain names, email addresses, URLs, etc. Use Recon, Delivery, C2, AoO – Exfiltration, etc. for the Kill Chain Stage column. 

Network Artifact Type Description Kill Chain Stage 
    
    
    

Malware

A list of any malware or hacking tools associated with the threat.  The Malware Analysis Report could be a link to an internal report or an external hyperlink. The Kill Chain Stage includes Recon, Delivery, Exploitation, Installation, C2, AoO – Exfiltration, AoO – Ransomware, etc.  

Malware Hash Type File Hash Description Malware Analysis Report Kill Chain Stage 
      
      
      

Common Vulnerabilities and Exposures (CVEs)

A list of CVEs associated with the threat. Completing this section may require help from other teams (e.g., vulnerability management). 

CVE NumberCVSS ScorePatch Available
(Y or N) 
Remediation Date Reported Patch Applied
(Y or N or N/A) 
      
      
      

MITRE ATT&CK Techniques

This section lists the MITRE ATT&CK techniques relevant to the threat broken into tactics, techniques, and procedures (TTPs). It also contains the MITRE D3FEND countermeasure that can be used to defend against said technique and/or the security control used by the organization.  

Tactic Technique Procedure D3FEND Security Control 
     
     
     

Detection Opportunities

This section includes opportunities to detect using vendor-specific detection rules, threat hunting queries, Sigma rules, or YARA rules that correspond with the threat. Reference can be a link to an internal detection rule/query or an external hyperlink. 

Rule/Query Name Type Description Reference 
    
    
    

Appendices

Probability Matrix

You should use estimative language to describe your confidence in intelligence assessments or related judgments. The following table describes the certainty the language you use in the report conveys to the reader to provide additional context. 

Almost Impossible Highly Unlikely Unlikely Possible Likely Highly Likely Almost Certain 
0-5%  5-25% 25-45% 45-55% 55-75% 75-85% 95-100% 

Priority Matrix

You should assign each report a priority based on its impact on your organization. The following table describes four general priority levels you can assign to a report. 

Low The threat requires regular monitoring and should be addressed when possible. 
Moderate The threat needs to be monitored closely and addressed. 
High The threat needs to be addressed quickly and monitored. 
Critical Immediate action is required. 

Source and Information Reliability

Each report should include an evaluation of source reliability. An industry standard is the Admiralty Scale, developed by NATO. This scale scores source reliability on a scale of A-F and information credibility on a scale of 1-6. Attaching an appendix that describes this to the reader provides clarity.  

Source Reliability (A-F) 
A (Completely reliable) The source has a history of consistently providing accurate information. 
B (Usually reliable) Most of the time, the source provides accurate information. 
C (Fairly reliable)  The source has provided accurate information on occasion. 
D (Not usually reliable) The source has provided accurate information infrequently. 
E (Unreliable) The source has rarely or never provided accurate information. 
F (Reliability cannot be judged) The source’s reliability is unknown or untested. 
Information Credibility (1-6) 
1 (Confirmed) Other independent sources have confirmed the information. 
2 (Probably true) The information is likely true but has not been confirmed. 
3 (Possibly true) The information might be true, but it is unconfirmed. 
4 (Doubtful) The information is unlikely to be true. 
5 (Improbable) The information is very unlikely to be true. 
6 (Cannot be judged) The credibility of the information cannot be assessed. 

Sensitivity Matrix

Each report should attach a sensitivity level as defined by your organization’s data protection policy. This ensures data is handled appropriately and only shared with appropriate personnel. Attaching an appendix that describes this to the reader provides clarity.  

TLP:CLEAR TLP:GREEN TLP:AMBER TLP:AMBER+STRICT TLP:RED
There are no sharing restrictions. The information can be publicly shared. Information can be shared within a community or sector to raise awareness of a threat. Sensitive information that can be shared on a need-to-know basis within an organization or community The information is restricted to the organization and should not be shared with its clients or trusted partners. Highly sensitive information that should only be shared with a limited number of authorized people 

Feedback Contacts

Provide a point of contact where the intelligence consumer can direct their feedback once the intelligence report has been published. This will help the CTI team improve future reports, ensure intelligence requirements are being met, and maintain communication channels.  

Role Name Title Phone Email 
Head of CTI     
CTI Manager     
CTI Lead     
CTI Analyst (author)     

Definitions and Acronyms

A list of key terms and acronyms used throughout the report. This lets the reader understand how the CTI team defines a particular technical term.  

Key Term Definition 
Actions on Objections (AoO) The final stage of a cyber attack is where a threat actor achieves their goals. This may include exfiltrating sensitive data, deploying ransomware, or performing espionage. 
Admiralty Scale A method used to evaluate the reliability of sources and the credibility of information in intelligence gathering. Reliability is scored from A to F, and credibility from 1 to 6. 
Command and Control (C2) The communication channel attackers aim to establish between compromised systems and their command infrastructure. 
Common Vulnerabilities and Exposures (CVE) A system and standardized naming convention used to identify and catalog publicly known cybersecurity vulnerabilities and exposures.  
Cyber Kill Chain A structured framework for understanding the different stages a cyber attack must complete to be successful. 
Cyber Threat Intelligence (CTI) The process of gathering, analyzing, and disseminating information about current or potential threats to an organization’s digital infrastructure 
Diamond Model A simple framework for analyzing and understanding cyber threats. Defenders use it to organize and structure their intrusion analysis. 
Estimative Language Carefully chosen words that convey the confidence, certainty, or likelihood of an intelligence assessment’s conclusion or judgment. 
Indicator of Compromise (IOC)  A piece of data or evidence that indicates a malicious activity has occurred within a network or on a computer system. 
Intelligence Requirement (IR) Specific information needs to guide the collection, analysis, and dissemination of cyber threat intelligence within an organization. 
Malware A term used to define any malicious software designed to harm, exploit, or otherwise compromise a computer system, network, or device (e.g., ransomware). 
MITRE ATT&CK A framework that provides a detailed and organized catalog of common tactics, techniques, and procedures (TTPs) threat actors use. 
MITRE D3FEND  A framework that provides a detailed catalog of defensive security controls and mitigations against attack techniques. 
Sigma Rules A standardized format for writing and sharing detection rules for identifying suspicious or malicious activity within log data. 
Tactic, Technique, Procedure (TTP) A way to describe and categorize the behavior of adversaries to help organizations anticipate, detect, and respond to cyber threats. 
Traffic Light Protocol (TLP) A classification framework for securely sharing and handling sensitive information in the cyber security community. 
YARA Rules A standardized format for identifying and classifying malware, detecting threats, and analyzing files based on patterns and signatures. 

Conclusion

It is vital that you and your team have a cyber threat intelligence report template that you can use to effectively share intelligence within your organization and with the wider community. This template should empower you to streamline your CTI processes and speed up the dissemination of threat intelligence. 

We have provided you with a comprehensive template that you can tailor to your organization’s needs and make your own. Use the form below to pick up your FREE copy as a PDF or Word document. 

Screenshot 23 8 2024 142926