What Are TTPs? Tactics, Techniques & Procedures Explained

Key Takeaways

  1. Tactics, Techniques, and Procedures (TTPs) describe the behavior of threat actors, providing a structured framework for understanding and responding to cyberattacks by analyzing their methods, strategies, and detailed actions.
  2. TTPs are crucial for proactive cybersecurity, enabling organizations to identify threat indicators, predict attack patterns, and implement countermeasures using frameworks like MITRE ATT&CK.
  3. By analyzing TTPs, security teams can uncover malicious tactics, detect generic or tailored techniques, and reconstruct detailed procedures, strengthening cyber threat intelligence and overall defense strategies.

The term Tactics, Techniques and Procedures (TTP) describes the behavior of a threat actor and a structured framework for executing a cyberattack. The actors can range from hacktivists and hobbyist hackers to autonomous cybercriminals, underground rings and state-sponsored adversaries.

By understanding the Tactics, Techniques and Procedures involved in a cyberattack kill chain, businesses can discover, evaluate and respond to security threats with a proactive approach.

Let’s take a look.

TTPs in security: Defining tactics, techniques & procedures

Taken collectively, TTPs are indicators of system artifacts or behavioral attributes that humans, often security professionals, actually observe. TTPs indicate, or show, when an unauthorized entity tries to take a blocked or disallowed activity, such as:

These indicators usually follow a consistent framework. These behavioral indicators suggest that an imminent cybersecurity risk is underway. When used effectively, TTPs can inform cyber threat intelligence and other security uses cases, like proactive threat hunting.

One security framework, MIRE ATT&CK, is a comprehensive collection of TTPs that attackers use in the real world.

Let’s define each part of the TTP triangle:

Now let’s review the Tactics, Techniques and Procedures in detail.

(TTPs in action: threat researchers analyze the TTPs employed by APT29 in the WINELOADER campaign and backdoor.)

Tactics

Tactics of a threat actor describe how they behave across different stages of the cyberattack kill chain. These stages include:

The difficulty of attributing potential threat to a campaign depends on the novelty and sophistication of the attack. If the threat indicators demonstrate common attack patterns — such as DDoS attacks — the next stages of the campaign tactics can be predicted by gathering data on things like:

A sophisticated attack tactic is focused on keeping under the radar and making only subtle changes to the compromised network until a malicious payload is delivered or data assets are exfiltrated to an external command and control server.

How to uncover tactics

One of the ways to discover such attacks is to closely analyze the artifacts, tools and infrastructure changes that lead up to any anomalous networking incident:

You can use a fingerprint of the actor’s tactical behavior — entry points, attack tooling, infrastructure changes and network traffic behavior — to associate a profile to the adversary and proactively authorize countermeasures for defense.

Techniques

Techniques are what the threat actors do in order to cause all sorts of bad problems:

These techniques tend to be generic and applicable to any cyberattack campaign. That’s why it is crucial to understand the methods and tooling that threat actors can employ for compromising your systems.

An important distinction. Techniques may not specify the technology, but only focus on the methodology of the campaign and guide on the sequence of actions involved.

For example, a social engineering spear phishing tactic may be used to trick an unsuspecting user into clicking a link that downloads a malicious payload to the local machine and steals login credentials. This technique may be designed specifically to target a limited set of users, in order to make the social engineering attack more convincing.

Detecting techniques

At the later stages of the attack, especially where payload delivery, movement across the network, configuration changes and vulnerability discovery is involved, the choice of tooling plays an important role.

At this stage, the adversary may already have installed a custom code into a vulnerable system component. If the installation remains untraced, InfoSec teams may need to analyze the system for:

The final stage of the cyber-attack technique may involve a combination of methodology and tooling: for instance, exfiltrating compromised data assets by first obfuscating it using the actor’s choice of networking protocols and encryption schemes.

Procedures

Procedures are the detailed description of how tactics are executed using the choice of techniques and a set of actionable, carefully crafted and precise actions (that is, procedures).

These actions are highly customized and the process is documented for threat actors to follow exactly according to specifications. These actions tend to be extensive but frequently repeated.

A malicious code may be delivered and patched onto vulnerable software for automated data gathering. Such a code automatically decrypts and interacts with related services and tools.

Learning the procedures

Security analytics can reconstruct these procedures by analyzing network and events logs. A cyber forensics team analyzing this information will also focus on the extended kill-chain process, techniques and tactics employed by the threat actor.

TTP underpins cyber threat intelligence

TTP information serves as an important guideline to gain contextual knowledge on threat indicators and traces discovered during security monitoring. TTP is also part of the open and community based cybersecurity programs recommended by the National Institute of Standards and Technology (NIST), which provides guidelines on sharing TTP knowledge base to help businesses improve their security posture.

Related Articles

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices
Learn
7 Minute Read

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices

Learn how to use LLMs for log file analysis, from parsing unstructured logs to detecting anomalies, summarizing incidents, and accelerating root cause analysis.
Beyond Deepfakes: Why Digital Provenance is Critical Now
Learn
5 Minute Read

Beyond Deepfakes: Why Digital Provenance is Critical Now

Combat AI misinformation with digital provenance. Learn how this essential concept tracks digital asset lifecycles, ensuring content authenticity.
The Best IT/Tech Conferences & Events of 2026
Learn
5 Minute Read

The Best IT/Tech Conferences & Events of 2026

Discover the top IT and tech conferences of 2026! Network, learn about the latest trends, and connect with industry leaders at must-attend events worldwide.
The Best Artificial Intelligence Conferences & Events of 2026
Learn
4 Minute Read

The Best Artificial Intelligence Conferences & Events of 2026

Discover the top AI and machine learning conferences of 2026, featuring global events, expert speakers, and networking opportunities to advance your AI knowledge and career.
The Best Blockchain & Crypto Conferences in 2026
Learn
5 Minute Read

The Best Blockchain & Crypto Conferences in 2026

Explore the top blockchain and crypto conferences of 2026 for insights, networking, and the latest trends in Web3, DeFi, NFTs, and digital assets worldwide.
Log Analytics: How To Turn Log Data into Actionable Insights
Learn
11 Minute Read

Log Analytics: How To Turn Log Data into Actionable Insights

Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
The Best Security Conferences & Events 2026
Learn
6 Minute Read

The Best Security Conferences & Events 2026

Discover the top security conferences and events for 2026 to network, learn the latest trends, and stay ahead in cybersecurity — virtual and in-person options included.
Top Ransomware Attack Types in 2026 and How to Defend
Learn
9 Minute Read

Top Ransomware Attack Types in 2026 and How to Defend

Learn about ransomware and its various attack types. Take a look at ransomware examples and statistics and learn how you can stop attacks.
How to Build an AI First Organization: Strategy, Culture, and Governance
Learn
6 Minute Read

How to Build an AI First Organization: Strategy, Culture, and Governance

Adopting an AI First approach transforms organizations by embedding intelligence into strategy, operations, and culture for lasting innovation and agility.