Cyber threat intelligence analysts produce defensible reports by weighing the same signals at tactical, operational, and strategic levels. A customizable CTI report template helps analysts capture activity, attribute it with calibrated confidence, and translate findings into defensive action.
A cyber threat intelligence (CTI) report template helps analysts produce defensible reports on adversary behavior. It serves CTI analysts writing intel reports, IR teams tracking activity clusters, and other security practitioners consuming attribution claims.
Download the template and make it your own. It’s available in the Markdown format.
The template organizes evidence and conclusions across these sections:
The template draws on established CTI frameworks but doesn’t lead with their names. Section headings use reader-friendly vocabulary. The frameworks shape the analytic discipline behind each section:
For a deeper overview of the attribution methodology, see Six Signals for Threat Attribution. For responder guidance during a live incident, use the Incident Response Report Template.
This CTI report template is distributed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). The license covers just the template. Any report you produce with it is yours.
Lenny Zeltser is a cybersecurity executive with deep technical roots, product management experience, and a business mindset. He has built security products and programs from early stage to enterprise scale. He is also a Faculty Fellow at SANS Institute and the creator of REMnux, a popular Linux toolkit for malware analysis. Lenny shares his perspectives on security leadership and technology at zeltser.com.