What Are Adversaries Doing? Automating Tactics, Techniques, and Procedures Extraction: A Systematic Review

This systematic review analyzes 80 peer-reviewed studies to map the current state of automated TTP extraction from unstructured text, highlighting a shift toward transformer and LLM-based models while identifying critical gaps in task diversity, dataset generalizability, and research reproducibility.

Mahzabin Tamanna, Shaswata Mitra, Md Erfan, Ahmed Ryan, Sudip Mittal, Laurie Williams, Md Rayhanur Rahman

Published 2026-04-07
📖 5 min read🧠 Deep dive

Imagine the world of cybersecurity as a massive, chaotic library where millions of books, diaries, and news clippings are being written every day by both the good guys (defenders) and the bad guys (adversaries). The bad guys are constantly inventing new ways to break into houses (networks), but they write about their crimes in messy, unorganized notes.

The goal of this research paper is to figure out how to build a super-smart librarian who can read all these messy notes, understand exactly what the bad guys are planning, how they are doing it, and why they are doing it, and then organize that information into a neat, searchable encyclopedia.

Here is a breakdown of the paper using simple analogies:

1. The Problem: The "Needle in a Haystack"

The authors explain that cyberattacks are exploding in number. Security experts are drowning in reports. Trying to manually read thousands of these reports to find specific details about how a hacker stole data is like trying to find a specific needle in a haystack while wearing blindfolded gloves. It's slow, tiring, and prone to mistakes.

They need a way to automatically extract TTPs:

  • Tactics: The Goal (e.g., "I want to steal your bank account").
  • Techniques: The Method (e.g., "I will guess your password").
  • Procedures: The Specific Steps (e.g., "I will type '1234' then '5678'").

2. The Mission: The "Detective's Review"

The authors didn't just write a new tool; they acted like detectives reviewing other detectives. They looked at 80 different research papers (studies) that tried to build these automatic extractors. They wanted to answer: Who is doing what? What tools are they using? And are they actually working?

3. What They Found: The "State of the Art"

After analyzing all 80 studies, they found a few major trends, which they explain like this:

  • The "Recipe" vs. The "Menu": Most researchers are focused on identifying the specific Techniques (the recipes). They are very good at spotting "I used a password cracker." However, they are less good at spotting the high-level Tactics (the menu item: "I am trying to steal money") or searching for specific techniques across huge libraries of text.
  • The Evolution of Tools:
    • Old School: Early researchers used simple Rule-Based systems (like a "Find and Replace" function). If the text said "password," flag it. This is like using a metal detector that only beeps for gold coins.
    • Middle Age: They moved to Machine Learning, which is like teaching a dog to sniff out different smells. It's better, but it needs a lot of training.
    • Modern Day: Now, everyone is using Transformers (like BERT) and Large Language Models (LLMs like ChatGPT). These are like super-intelligent detectives who understand context. They know that "I will crack the safe" means something different than "I will crack a joke."
  • The "Black Box" Problem: A major issue the authors found is Reproducibility. Imagine a chef writes a recipe for a delicious cake but doesn't list the ingredients or the oven temperature. You can't bake it yourself.
    • Many of these 80 studies are like that. They say, "We built a great system!" but they don't share their code or the data they used. This makes it impossible for other scientists to check if the cake actually tastes good or if the chef just made it up.

4. The Data Sources: Where the Clues Come From

The researchers looked at where these "detectives" get their information.

  • The Main Source: Most studies use CTI Reports (Cyber Threat Intelligence). These are like the official police reports written by security companies (like FireEye or Kaspersky).
  • Other Sources: Some use System Logs (like a security camera recording), Vulnerability Databases (lists of broken locks), or even Dark Web Forums (where hackers brag about their crimes).
  • The Gap: The authors noticed that while everyone loves reading police reports, very few people are analyzing the raw security camera footage (system logs) or the actual stolen goods (malware code).

5. The Future: What Needs to Happen?

The paper concludes with a "To-Do List" for the future, using these metaphors:

  • Stop Using Fake Scenarios: Many studies test their tools on clean, perfect data. It's like a driving test where the road is empty and the weather is perfect. We need to test these tools on messy, real-world data where the road is full of potholes and rain.
  • Share the Blueprints: We need more researchers to share their code and data. If we all share our blueprints, we can build a better house together instead of everyone reinventing the wheel.
  • Think in 3D: Currently, most tools look at one sentence at a time. But a crime story is a whole chapter. We need tools that understand the whole story, including the order of events and the connections between different parts of the report.
  • The "Multi-Task" Challenge: Real attacks are complex. A hacker might try to steal data and delete files at the same time. Current tools often try to pick just one thing. We need tools that can handle multiple goals at once.

The Bottom Line

This paper is a massive map of the territory. It tells us that we have made incredible progress in teaching computers to read hacker notes, moving from simple spell-checkers to super-smart AI detectives. However, the field is still a bit messy. We need better data sharing, more realistic testing, and tools that can understand the full story of an attack, not just isolated words.

If we fix these issues, we can build a security system that doesn't just react to attacks after they happen, but actually understands the enemy's playbook before they even strike.

Get papers like this in your inbox

Personalized daily or weekly digests matching your interests. Gists or technical summaries, in your language.

Try Digest →