Incident Command Platform
← Glossary

TTP — Tactics, Techniques, and Procedures

Tactics, Techniques, and Procedures (TTPs) describe adversary behavior across three layers of abstraction. Tactics represent the strategic objectives an attacker pursues, techniques describe the methods used to achieve those objectives, and procedures detail the specific implementation of each technique. TTPs are the foundation of threat intelligence and detection engineering.

The Three Layers

MITRE ATT&CK Framework

The MITRE ATT&CK framework is the industry-standard knowledge base that catalogs known adversary TTPs across enterprise, mobile, and cloud environments. It organizes techniques under tactical categories and maps them to specific threat groups and software. Security teams use ATT&CK to evaluate detection coverage, design hunting hypotheses, and communicate about threats using a shared vocabulary. During incident response, mapping observed adversary activity to ATT&CK techniques helps predict the attacker's next moves and prioritize containment actions.

Why TTPs Are More Valuable Than IOCs

IOCs like IP addresses and file hashes are easy for adversaries to change. A threat group can rotate infrastructure and recompile tooling in minutes. TTPs, by contrast, represent the adversary's tradecraft -- their operational habits, preferred tools, and established workflows. Changing TTPs requires retraining operators and rebuilding toolchains, which is expensive and slow. Detection rules built around TTPs remain effective even as the adversary rotates their infrastructure, making TTP-based detection more durable than IOC-based detection alone.

TTPs in Incident Response

During an active incident, identifying the adversary's TTPs helps the response team anticipate next steps. If forensic analysis reveals that the attacker used a specific initial access technique associated with a known threat group, the team can proactively hunt for that group's typical persistence and lateral movement techniques before they are executed. This predictive capability dramatically reduces containment time.

Map adversary TTPs during every incident

IR-OS incident records capture observed techniques alongside response actions, building institutional knowledge over time.

Start free