In cyber security, TTP stands for Tactics, Techniques, and Procedures—a framework used to understand and analyze how attackers operate.

Introduction

Cyber attackers rarely strike randomly. They follow patterns, methods, and strategies. In cyber security, these are called TTPs (Tactics, Techniques, and Procedures). Understanding TTPs helps defenders anticipate, detect, and mitigate cyber threats effectively.

TTP Full Form Breakdown

  • Tactics: The overall goals or strategies of the attacker (e.g., gaining access, stealing data).
  • Techniques: The specific methods used to achieve those goals (e.g., phishing, brute-force login).
  • Procedures: The detailed steps or tools used (e.g., sending a fake invoice email with a malware attachment).

Together, TTPs describe an attacker’s behavior in a structured way.

Examples of TTPs in Action

  • Tactic: Data theft
  • Technique: Spear-phishing email
  • Procedure: Sending a malicious PDF disguised as a company report
  • Tactic: Disruption
  • Technique: Distributed Denial-of-Service (DDoS)
  • Procedure: Using botnets to flood servers with fake traffic

Common Confusion

TTPs are often confused with IOCs (Indicators of Compromise). The difference:

  • TTPs = Attacker behavior (how threats are carried out).
  • IOCs = Evidence of an attack (IP addresses, file hashes, domains).

Quick Reference Table

Term Meaning Example
Tactics Goal of attack Stealing credentials
Techniques Method used Phishing emails
Procedures Detailed steps Sending fake login page

FAQs

Q1: Why are TTPs important in cyber security?
They help analysts predict and defend against evolving attack strategies.

Q2: Are TTPs the same as MITRE ATT&CK framework?
Not exactly—MITRE ATT&CK is a structured database built around TTPs.

Q3: Can TTPs change over time?
Yes, attackers constantly evolve their TTPs to bypass defenses.

Conclusion

The TTP (Tactics, Techniques, and Procedures) framework is a cornerstone of cyber threat intelligence. By analyzing TTPs, security teams can move from reactive defense to proactive threat hunting, staying one step ahead of attackers.