What is ttp

Last updated: April 1, 2026

Quick Answer: Tactics, Techniques, and Procedures (TTP) is a framework used in cybersecurity and threat intelligence to describe the specific methods and behaviors employed by threat actors and attackers.

Key Facts

Overview

Tactics, Techniques, and Procedures (TTP) is a critical framework in cybersecurity and threat intelligence. It provides a structured way to understand, document, and share information about how threat actors conduct their attacks. By breaking down threat actor behavior into categories, security professionals can better defend against attacks, attribute threats to specific groups, and improve their defensive posture.

Understanding the Framework

The TTP framework consists of three interconnected components. Tactics represent the high-level goals or objectives that threat actors aim to achieve (reconnaissance, initial access, execution, persistence, defense evasion, credential access, discovery, lateral movement, collection, command and control, exfiltration, impact). Techniques represent the specific methods used to accomplish these tactics. Procedures represent the specific implementation of techniques, including tools and sequences of actions specific to a particular threat actor or campaign.

MITRE ATT&CK Framework

The most widely adopted TTP taxonomy is the MITRE ATT&CK framework, a comprehensive knowledge base of techniques and tactics used by adversaries. Developed by MITRE Corporation, ATT&CK provides a standardized way for security teams to document and share threat intelligence. It includes tactics spanning the entire attack lifecycle, from initial reconnaissance through data exfiltration and impact. Each tactic contains multiple techniques with real-world examples and mitigation strategies.

Practical Applications

Security teams use TTP knowledge for multiple purposes.

Threat Actor Attribution

Different threat actor groups often employ distinctive combinations of TTPs. By analyzing the tactics, techniques, and procedures used in an attack, security professionals can potentially attribute the attack to a known threat group. Threat intelligence reports often document the TTPs associated with specific adversaries, helping organizations understand which groups might target them and what defensive measures are most appropriate.

Related Questions

How are TTPs different from indicators of compromise (IOCs)?

IOCs are specific technical artifacts like IP addresses, file hashes, or malware signatures that indicate a compromise has occurred. TTPs describe the behavior and methods used by attackers. While IOCs are tactical details that change frequently, TTPs represent persistent attack patterns.

What is the MITRE ATT&CK framework and how does it relate to TTPs?

MITRE ATT&CK is a comprehensive, publicly available database that documents and categorizes adversary tactics and techniques. It provides the primary standardized taxonomy that security professionals use to describe and discuss TTPs across the industry.

How can understanding TTPs help with cybersecurity defense?

Understanding adversary TTPs helps organizations prioritize security controls, develop effective detection rules, conduct red team exercises, respond more effectively to incidents, and implement defenses that address the most likely attack paths relevant to their organization.

Sources

  1. MITRE ATT&CK Framework CC-BY-SA-4.0
  2. Wikipedia - Threat Intelligence CC-BY-SA-4.0