What are TTPs?

TTP stands for Tactics, Techniques, and Procedures – a classification system that describes how cyber attackers operate. It is widely used in Threat Intelligence and frameworks such as MITRE ATT&CK and MITRE ATT&CK for ICS.

TTPs make it possible to understand, attribute and detect attacks based on their behaviour and modus operandi, rather than only on technical features such as IP addresses or Malware hashes.


🧠 How do TTPs work?

  1. Tactics – The goal or motive of an attacker (e.g. Initial Access, Lateral Movement)
  2. Techniques – The way in which that goal is achieved (e.g. Phishing, Valid Accounts)
  3. Procedures – The specific execution of a technique by a particular threat actor

An example:

  • Tactic: Initial Access
  • Technique: Exploit Public-Facing Application
  • Procedure: Use of a known vulnerability in a SCADA web interface

By analysing TTPs, OT organisations can develop targeted detection rules and adapt their defences.


🏭 Application of TTPs in industrial networks

  • Use of ATT&CK for ICS to map TTPs to OT systems such as PLC, HMI, SCADA, Engineering Station
  • Threat simulations or Red Team exercises work with real TTPs from known attackers
  • OT-specific SIEM rules and SOAR playbooks are aligned with relevant TTPs
  • Threat Hunting focuses on traces of techniques such as:
  • Abuse of Valid Accounts (T1078)
  • Inhibit Response Function (T0829)
  • Loss of Control (T0831)
  • Modify Alarm Settings (T0855)

Understanding TTPs helps OT teams take proactive security measures.


🔍 TTPs vs. IOCs

Aspect TTP (Tactics, Techniques, Procedures) IOC (Indicator of Compromise)
Focus Attacker behaviour Technical traces (IP, hash, domain)
Reusability High – often remains the same Low – quickly outdated
Use in OT Recommended for detection, simulation, hunting Complementary for fast blocking

🔐 Security aspects

Good knowledge of TTPs helps in predictively designing detection and mitigation, including in industrial networks.


📌 In summary

TTPs are a powerful means to understand, simulate and detect attacks at the behavioural level. For OT environments, they form the bridge between strategy, threat and defence.