OSINT - Template Report
OSINT - Template Report
Template
For your engagement, this page would be removed.
Because this is a template report, this page stands to explain how to utilize the entire document.
Before you go further, please read through this page so that you know how to use this
document.
Below, you will find modules meant for various types of OSINT investigations as well as
templates meant to keep certain OSINT documentation organized, like sock puppets.
This report template was designed in a modular way to allow the investigator to remove what is
not necessary for their investigation.
For example, if you were doing research into a company for an external pentest, you may end
up using:
Website OSINT
Email OSINT
Password OSINT
Etcetera
If you need further direction, please refer to the “Writing an OSINT Report” section of the TCM
Security OSINT course.
Open-Source
Intelligence
(OSINT)
Investigation
2
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Table of Contents
IMPORTANT - HOW TO USE THIS REPORT TEMPLATE...........................................................................................1
CONFIDENTIALITY STATEMENT............................................................................................................................ 4
DISCLAIMER........................................................................................................................................................ 4
CONTACT INFORMATION..................................................................................................................................... 4
ASSESSMENT OVERVIEW..................................................................................................................................... 5
SUMMARY – MONARCH MIGRATION.................................................................................................................. 6
TECHNICAL EVIDENCE – REVERSE IMAGE SEARCH...............................................................................................................7
TECHNICAL EVIDENCE – GOOGLE SEARCH OPERATORS........................................................................................................8
SUMMARY – EMOTET TIMELINE.......................................................................................................................... 9
TECHNICAL EVIDENCE – GOOGLE SEARCH OPERATORS......................................................................................................10
TECHNICAL EVIDENCE – RESEARCH & ANALYSIS...............................................................................................................11
SUMMARY – EMAIL RECON............................................................................................................................... 13
TECHNICAL EVIDENCE – GOOGLE SEARCH OPERATORS......................................................................................................14
SUMMARY – CHALLENGE 4................................................................................................................................ 15
TECHNICAL EVIDENCE – XXX........................................................................................................................................16
3
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Confidentiality Statement
This document is the exclusive property of Demo Corp and TCM Security (TCMS). This
document contains proprietary and confidential information. Duplication, redistribution,
or use, in whole or in part, in any form, requires consent of both Demo Corp and TCMS.
Demo Corp may share this document with auditors under non-disclosure agreements to
demonstrate penetration test requirement compliance.
Disclaimer
This Open-Source Intelligence (OSINT) report has been compiled by TCM Security
based on information available in the public domain as of [INSERT DATE HERE]. While
efforts have been made to ensure the accuracy of the information, it is subject to
change. An OSINT investigation is considered a snapshot in time. The findings and
recommendations reflect the information gathered during the assessment and not any
changes or modifications made outside of that period.
TCM Security assumes no responsibility for any decisions made or actions taken based
on this report. The use of this information is at the reader's own risk, and TCMS
disclaims any liability for inaccuracies or omissions. This report is confidential and not
intended for public distribution.
Contact Information
Name Title Contact Information
DEMO CORP
Jane Smith Chief Information Security Officer [email protected]
TCM Security
Heath Adams Lead Penetration Tester [email protected]
4
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Assessment Overview
From [START DATE] to [END DATE], the OSINT Investigator conducted an Open-
Source Intelligence (OSINT) assessment. The findings presented in this overview are
derived from open-source data and do not involve any unauthorized access to private or
confidential information. An OSINT risk assessment emulates the role of a threat actor
employing methods like those utilized by malicious entities to gather information.
Through data collection and analysis, an investigator will search open sources to
identify potential risks, culminating in an assessment and profiling of discovered
information.
5
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
6
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Summary – Monarch Migration
Objective
Geolocating this place may not be hard but the threatened arthropods that can be found in this
place sure makes a hard migration every few generations.
You should be able to find a few decorative posters that have been made to commemorate this
mighty migration. In one poster, a specific interstate highway is mentioned. What is this
interstate highway and how many states does it go through?
Incredibly, scientists have able to identify a single member of this species with the longest
travel. How many miles was the longest known individual migration identified by this species?
Key Findings
TCMS determined that the image provided was from the Great Smoky Mountains.
In reading the Great Smoky Mountains National Park Service website TCMS identified that the
Monarch butterfly is the only endangered arthropod that can be found in the park that makes a
long migration.
Through further research, it was identified that the Monarch butterfly is featured on a poster of
the US Highway 35. This highway system goes through six (6) US states. Finally, the longest
known individual migration was determined to be 2880 miles.
Photograph of Subject
7
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
8
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Technical Evidence – Reverse Image Search
Used Google Lens to reverse image search and Google search operators to
OSINT:
identify the location and threatened arthropod.
https://www.nps.gov/grsm/learn/nature/te-species.htm
Link(s): https://www.fs.usda.gov/wildflowers/pollinators/Monarch_Butterfly/
migration/index.shtml
It was important to carefully focus on the mountain range to get a match to
Notes: Great Smoky Mountains. The National Park website confirmed that the
Monarch was on the threatened list.
9
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Technical Evidence – Google Search Operators
10
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Summary – Emotet Timeline
Objective
You are an intelligence analyst working for a cybersecurity firm. Your task is to investigate a
series of cyber-attacks where Emotet was utilized, targeting financial institutions. The attacks
have resulted in significant financial losses and reputation damage for the institution.
After the timeline has been made, identify open-source intelligence sources such as
cybersecurity blogs, research papers, threat intelligence reports, forums, and social media
platforms for information related to Emotet campaigns to create a list of tactics, techniques, and
procedures (TTPs) employed by the threat actors behind the campaigns in 2024.
Key Findings
Initial Emergence (2014-2016): Emotet first emerged as a banking trojan around 2014,
primarily targeting financial institutions and users' banking credentials. It spread via malicious
email attachments and infected systems to steal sensitive information.
Evolution into a Malware Delivery Platform (2017-2018): By 2017 and 2018, Emotet evolved
into a sophisticated malware delivery platform capable of distributing other malware payloads,
including ransomware and information stealers. It expanded its target base beyond financial
institutions to include organizations across various sectors.
Periodic Takedowns and Resurgences (2019-2020): Throughout 2019 and 2020, law
enforcement agencies, cybersecurity firms, and international partnerships conducted several
takedowns of Emotet infrastructure, disrupting its operations temporarily. However, Emotet
consistently resurfaced with new tactics and infrastructure.
Global Impact and Notoriety (2019-2021): Emotet gained notoriety as one of the most prolific
and widespread malware threats globally during this period. Its modular architecture and
polymorphic capabilities made it challenging to detect and mitigate, leading to significant
financial losses and data breaches for affected organizations.
Disruption Efforts and Arrests (2021-2023): Law enforcement agencies intensified efforts to
disrupt Emotet operations, resulting in multiple arrests of key individuals associated with the
malware distribution network. These actions temporarily disrupted Emotet's infrastructure and
reduced its prevalence in the threat landscape.
Transition to Private Sector Control (2023): In 2023, Emotet comes back online with a focus
on the private sector.
11
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Technical Evidence – Google Search Operators
12
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Technical Evidence – Research & Analysis
13
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Figure 2: Malicious activity Identified from link 2 (sample.bin)
14
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Summary – Email Recon
Objective
Identify three (3) email accounts owned by Apple that have to do with security. Provide context
about who owns them or what they are for.
In order to successfully complete this challenge, the email accounts need to be discovered on
official Apple documentation.
Key Findings
All email accounts identified below were found on an Apple Support article titled “Recognize and
avoid phishing messages, phony support calls, and other scams”.
Email Accounts
[email protected]
A place to report suspicious emails or SMS texts to Apple.
[email protected]
A place to report a suspicious FaceTime call or link to a FaceTime call in Messages or Mail.
[email protected]
A place to report iCloud email spam.
15
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Technical Evidence – Google Search Operators
16
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Summary – Challenge 4
Objective
<Input the objective here>
Key Findings
<Input key findings here>
Photograph of Subject
<input any photographs here or erase if unneeded>
Personal Information
<Name:
Date of Birth:
Phone number:
Address:
Erase if unneeded>
Location Information
<input location information here or erase if unneeded>
17
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)
Technical Evidence – XXX
Figure 1: XXX
Figure 2: XXX
Figure 3: XXX
18
DEMO CORP
BUSINESS CONFIDENTIAL
Copyright © TCM Security (tcm-sec.com)