Skip to content
Cybersecurity

TTP

TTP (Tactics, Techniques, Procedures) is a framework describing how cybercriminals operate. Tactics define the attack goal, Techniques the methods to achieve the goal, and Procedures the specific implementations. TTP forms the foundation of threat intelligence and is key to understanding adversary behavior.

What is TTP?

TTP Definition

TTP (Tactics, Techniques, Procedures) is a hierarchical model describing how cybercriminals and APT groups operate. The TTP framework forms the foundation of modern threat analysis and threat intelligence, enabling systematic description and categorization of attacker behaviors.

TTP Structure

Tactics:

  • Strategic attack objective
  • “Why” the attacker performs an action
  • Example: Initial Access, Persistence, Exfiltration

Techniques:

  • Method to achieve the objective
  • “How” the attacker accomplishes the tactic
  • Example: Phishing, Valid Accounts, Data Encrypted

Procedures:

  • Specific technique implementation
  • Specific tools and commands
  • Example: Spear-phishing with .docx attachment containing macro

TTP in MITRE ATT&CK

The MITRE ATT&CK framework is a practical implementation of the TTP model:

  • 14 tactics (matrix columns)
  • 200+ techniques
  • Sub-techniques as refinements
  • Procedures in group and campaign descriptions

TTP Applications

  • Threat Intelligence: APT group profiling
  • Detection Engineering: Creating detection rules
  • Incident Response: Analyzing attacker behavior
  • Red Team: Attack simulation planning
  • Risk Assessment: Organizational threat assessment

TTP vs IOC

AspectTTPIOC
DurabilityStable, hard to changeEasily changed
LevelBehavioralTechnical
DetectionMore reliableEasy to evade
ExampleAttack techniqueHash, IP, domain

TTP represents behaviors that are harder to change than technical indicators of compromise.

Pyramid of Pain

David Bianco’s model illustrates TTP value:

  • Top of pyramid: TTP - hardest for attacker to change
  • Middle: Tools, network artifacts
  • Bottom: Hash values, IP - easy to change

TTP-based detection is most effective long-term.

TTP is the language describing cybercriminal behavior, essential for mature security operations and threat intelligence.

Want to Reduce IT Risk and Costs?

Book a free consultation - we respond within 24h

Response in 24h Free quote No obligations

Or download free guide:

Download NIS2 Checklist