<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-lehmann-idmefv2-07" ipr="trust200902" consensus="true" obsoletes="4765">
  <front>
    <title abbrev="IDMEFv2">The Incident Detection Message Exchange Format version 2 (IDMEFv2)</title>
    <author fullname="Gilles Lehmann">
      <organization>Telecom SudParis</organization>
      <address>
        <postal>
          <country>FR</country>
        </postal>
        <email>gilles.lehmann@telecom-sudparis.eu</email>
      </address>
    </author>
    <date day="27" month="March" year="2026"/>
    <keyword>RFC4765</keyword>
    <keyword>RFC4766</keyword>
    <keyword>IDMEF</keyword>
    <abstract>
      <t>The Incident Detection Message Exchange Format version 2 (IDMEFv2) defines a
        data representation for security incidents detected on cyber and/or physical
        infrastructures.</t>
      <t>The format is agnostic so it can be used in standalone or combined cyber
        (SIEM), physical (PSIM) and availability (NMS) monitoring systems. IDMEFv2 can
        also be used to represent man made or natural hazards threats.</t>
      <t>IDMEFv2 improves situational awareness by facilitating correlation of multiple types
        of events using the same base format thus enabling efficient detection of complex
        and combined cyber and physical attacks and incidents.</t>
      <t>This draft is maintained by the IDMEFv2 Task Force. Please consult our website
        for more information: https://www.idmefv2.org.</t>
      <t>If approved this draft will obsolete RFC4765.</t>
    </abstract>
  </front>
  <middle>
    <section>
      <name>Introduction</name>
      <t>The Incident Detection Message Exchange Format (IDMEF) is intended to solve
            the problem of security monitoring compartmentalization by proposing a single format to represent
            any type of incident, whether cyber or physical, intentional or accidental, natural or man-made.</t>
      <t>Indeed security is often associated  to the Confidentiality-Integrity-Availability triad,
            performance and availability management systems are still run independently
            from security management systems.</t>
      <t>Additionally, with the adoption and integration of Internet of Things (IoT)
            and Industrial Internet of Things (IIoT) devices, and the exponential emergence
            of smart systems (transport, cities, buildings, etc), an increasingly interconnected mesh of cyber-physical systems (CPS) has emerged.
            This expansion of the attack and incident surfaces blurs the once-clear functions of cybersecurity and physical security.</t>
      <t>Finally, as IT infrastructure moves out of data centers it  becomes more exposed to
            external threats, including natural and man-made hazards.</t>
      <t>Incident detection systems have traditionally focused on detecting cyber incidents or physical incident or availability  incidents.
            There is an increasing need nowadays to have a unified view and management of all those incidents and their interconnection.</t>
      <t>To achieve this goal the Incident Detection Message Exchange Format offers a unique data representation for
            multiple types of events:</t>
      <ul>
            <li>
                <t>Cyber-security events (e.g. authentication failure/success, virus/malware
                    detection, bruteforce/scan detection, etc.)</t>
            </li>
            <li>
                <t>Physical security events (e.g. intrusion detection, object detection,
                    face or activity recognition, fire/smoke/noise/rain detection, etc.)</t>
            </li>
            <li>
                <t>Availability/observability/performance events (e.g. system failure, service malfunction,
                    performance decrease, etc.)</t>
            </li>
            <li>
                <t>Natural and man made hazards events (e.g. wildfires, avalanches, droughts, earthquakes,
                    pollution, fire, explosion, etc.)</t>
            </li>
        </ul>
      <section>
        <name>IDMEFv2 deployment architecture</name>
        <t>IDMEFv2 can be used to exchange incident detection information between specialized managers
                (SIEM, PSIM, NMS) and a universal "Cyber &amp; Physical SIEM" (CPSIEM) or directly from specialized analyzers and
                a CPSIEM.</t>
        <figure anchor="global_view">
          <name>IDMEF Use Architecture</name>
          <artwork type="ascii-art" align="center">                   +-----------------------------+    +---------+
                   |    "Universal" CPSIEM       |&lt;---| Hazards |
                   +-----------------------------+    +---------+
                       |          |         |
                    +------+   +-----+   +------+
    Managers        | PSIM |   | NMS |   | SIEM |
                    +------+   +-----+   +------+
                       |          |         |
                   +--------+ +----------+ +-----+
Analyzers/Sensors  |Physical| |Monitoring| |Cyber|
                   +--------+ +----------+ +-----+
                       |           |          |
                  +-------------------------------+
                  |    Cyber &amp; Physical System    |
                  +-------------------------------+</artwork>
        </figure>
        <t>Thanks to its universality IDMEFv2 improves situational awareness by enabling correlation of multiple types
                of events using the same base format.</t>
        <t>This document defines a model serialization methods for the purpose of describing and sharing these events.</t>
      </section>
      <section>
        <name>IDMEFv1 (Intrusion Detection Message Exchange Format) -  RFC 4765 - Legacy</name>
        <t>IDMEFv2 (Incident Detection Message Exchange Format) is based on IDMEFv1 (Intrusion Detection Message Exchange Format) concepts. But IDMEFv1 was cyber intrusion focused as IDMEFv2 perimeter is much larger. Thus retro-compatibility although partly possible has not been a priority.</t>
      </section>
      <section>
        <name>Relationship between IDMEFv2 and other event/incident formats</name>
        <t>IDMEFv2 focuses essentialy on high level event/incident correlation and detection.There are
                many standard and proprietary formats on the incident detection market and in particular on the cybersecurity market.
                IDMEFv2 is complementary to most of these formats.</t>
        <t>IDMEFv1 (Intrusion Detection Message Exchange Format - RFC 4765) : IDMEFv2 (Incident Detection) replaces and obsoletes IDMEFv1
                (Intrusion Detection) by covering a wider spectrum.</t>
        <t>IODEFv2 (Incident Object Definition Exchange Format - RFC 5070) : IDMEFv2 helps detect incident. When an incident is detected it will
                be analysed and eventually fully described and shared with other security teams through IODEFv2.
                IODEFv2. IDMEF is used upstream IODEFv2. IDMEfv2 aLerts can be “attached” to IODEFv2 object
                to provide technical details about incidents.</t>
        <t>Syslog (System Logging) : Syslog is a lossy format with no formal structuration. Syslog can
                be used by sensors to send information to analyzers. Out of those multi-format
                syslogs the analyzer might detect an incident or an event of interest. The analyzer
                will then use IDMEFv2 to notify the manager which might correlate this information
                with other datas to confirm the incident.</t>
        <t>SNMP (Simple Network Management Protocol) : SNMP polls information from devices which is then compared to thresholds
                to detect incident. IDMEFv2 can be used when incident is detected downstream of
                SNMP to communicate the incident to the manager. IDMEFv2 can have a similar role as SNMP Traps.</t>
        <t>STIX (Structured Threat Information Expression) : is a language and serialization format used to exchange cyber threat intelligence (CTI).  IDMEFv2 can help detect incidents which might lead to the creation and sharing of STIX information.
                Cyber analyzer  can also rely on STIX information to detect incidents that will be notified in IDMEFv2 format.</t>
        <t>OCSF (The Open Cybersecurity Schema Framework) is an open-source, vendor-agnostic standard designed to normalize security telemetry from diverse tools. It provides a common language and consistent structure for security event data, simplifying data ingestion, correlation, and analysis. OCSF can be seen as a “super” syslog to describe events before IDMEFv2 extract “incidents”. OCSF is limited to cyber security.</t>
        <t>SIEM proprietory formats (CEF, LEEF, ECS, CIM, ...) : By covering cyber, physical and
                monitoring incidents type, IDMEFv2 offers a wider spectrum than those formats.
                Gateways between IDMEFv2 and those formats can be developped to connect legacy
                cyber detection systems to an IDMEFv2 architecture.</t>
      </section>
      <section>
        <name>Existing Deployments and Adoption</name>
        <t>IDMEFv2 is not a theoretical proposal. It has been developed, validated, and deployed within the framework of eight large-scale European research projects, funded by the Horizon 2020 and Digital Europe programmes. These projects — namely 7SHIELD, PRECINCT, CyberSEAS, ATLANTIS, ENDURANCE, KINAITICS, TESTUDO, and SAFE4SOC — address critical sectors such as space systems, energy grids, transportation, and government infrastructure. These implementations span multiple domains, including Security Operations Centers (SOCs), Physical Security Information Management (PSIM) systems, and critical infrastructure protection pilots.</t>
        <t>This document aims to formalize this existing practice as an IETF Experimental RFC, to ensure interoperability, gather broader community feedback, and provide a stable foundation for future developments.</t>
      </section>
    </section>
    <section>
      <name>Terminology</name>
      <section>
        <name>Keywords</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
                "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
                document are to be interpreted as described in <xref target="RFC2119"/>.</t>
      </section>
      <section>
        <name>Normative sections</name>
        <t>Implementations of IDMEFv2 are REQUIRED to fully implement:</t>
        <ul>
                <li>
                    <t>The data types defined in <xref target="data-types"/></t>
                </li>
                <li>
                    <t>The data model defined in <xref target="model"/></t>
                </li>
                <li>
                    <t>The JavaScript Object Notation (JSON) serialization method <xref target="json-sm"/>.</t>
                </li>
            </ul>
      </section>
      <section>
        <name>Concepts related to event processing</name>
        <section>
          <name>Event</name>
          <t>An event is something that triggered a notice. Any incident starts off as an event
                    or a combination of events, but not all events result in an incident.
                    An event need not be an indication of wrongdoing. E.g. someone successfully logging in
                    or entering a building is an event.</t>
        </section>
        <section>
          <name>Incident</name>
          <t>An incident is an event that compromises or has a significant probability of compromising
                    at least one of the organization's security criteria such as Confidentiality, Integrity
                    or Availability.
                    An incident may affect a production tool, personnel, etc.
                    It may be logical, physical or organizational in nature.
                    Last but not least, an incident may be caused on purpose or by accident.</t>
        </section>
        <section>
          <name>Alert</name>
          <t>An alert is a notification/message that a particular event/incident (or series of events/incidents)
                    has occurred.</t>
        </section>
        <section>
          <name>Manager</name>
          <t>The manager is the central console toward which all analyzers send their alerts.
                    The manager collects, correlates, stores and displays the alerts to the operators.</t>
          <t>Example :
                    - A SIEM (Security Information &amp; Event Management) or a Log Manager)
                    - A PSIM (Physical Security Information Management)
                    - A NMS (Network Management System)
                    - A CPSIEM (Cyber &amp; Physical Security Information Management System)</t>
        </section>
        <section>
          <name>Operator</name>
          <t>The level 1 operator is in charge of receiving manager notifications and identify or confirm when an event should be considered as an incident. The operator must also decide if there is a known resolution for this incident or if it needs a deeper analysys.</t>
        </section>
        <section>
          <name>Analyst</name>
          <t>The analyst will be contacted by the operator to analyze complex incidents that can’t be easily resolved. The investigation starts with the IDMEFv2 information but the analyst might need more information like raw logs for a deeper forensics.</t>
        </section>
        <section>
          <name>Attack</name>
          <t>An attack is an attempt to destroy, expose, alter, disable, steal or gain unauthorized access
                    to or make unauthorized use of a cyber or physical asset. An attack is one or many kinds of
                    incidents.</t>
        </section>
        <section>
          <name>Correlation</name>
          <t>Correlation is the identification of relationships between two or more events.</t>
        </section>
        <section>
          <name>Aggregation</name>
          <t>Aggregation is the consolidation of similar events into a single event.</t>
        </section>
      </section>
    </section>
    <section anchor="data-types">
      <name>The IDMEF Data Types</name>
      <t>Each object inside the IDMEF data model has an associated data type.
            This type may be used to validate the content of incoming IDMEF messages.</t>
      <section>
        <name>Classes</name>
        <t>The classes are meant to group related attributes together.
                Some of the classes may be instanciated multiple times (e.g. Source, Target, etc.)
                while others may only appear once in an IDMEF message (e.g. Analyzer).</t>
      </section>
      <section>
        <name>Numbers</name>
        <section anchor="data-types-integers">
          <name>Integers</name>
          <t>Integers inside the IDMEF data model are expressed using the following ABNF <xref target="RFC5234"/>
                    grammar:</t>
          <sourcecode type="none">integer         =  *1minus int
int             =  zero / ( digit1-9 *DIGIT )
minus           =  %x2D                           ; -
zero            =  %0x30                          ; 0
digit1-9        =  %x31-39                        ; 1-9</sourcecode>
          <t>E.g. 123.</t>
          <t>Such values are indicated with the "INT" type annotation in the model.</t>
        </section>
        <section>
          <name>Floating-point values</name>
          <t>Floating-point values inside the IDMEF data model are expressed using
                    the following ABNF grammar:</t>
          <sourcecode type="none">float           =  integer *1frac
frac            =  decimal-point 1*DIGIT
decimal-point   =  %x2E                            ; .</sourcecode>
          <t>This grammar reuses some of the production rules listed in <xref target="data-types-integers"/>.</t>
          <t>E.g. 12.34.</t>
          <t>Such values are indicated with the "FLOAT" type annotation in the model.</t>
        </section>
      </section>
      <section>
        <name>Strings</name>
        <t>Strings are series of characters from the <xref target="UNICODE"/> standard
                and are used to represent a text.</t>
        <t>For readability, this document uses quotes (") to delimit strings, but please note
                that these quotes are not syntactically part of the actual strings.</t>
        <t>E.g. "Hello world".</t>
        <t>Some of the strings used in the IDMEFv2 data model follow a stricter syntax.
                These are included below for completeness.</t>
        <t>Such values are indicated with the "STRING" type annotation in the model.</t>
        <section anchor="data-types-enums">
          <name>Enumerations</name>
          <t>Enumerations are special strings used when valid values for an IDMEF attribute
                    are restricted to those present in a predefined list.</t>
          <t>Such values are indicated with the "ENUM" type annotation in the model.</t>
        </section>
        <section>
          <name>Timestamps</name>
          <t>Timestamps are used to indicate a specific moment in time.
                    The timestamps used in the IDMEF data model follow the syntax defined by the
                    "date-time" production rule of the grammar in <xref target="RFC3339"/> ch 5.6.</t>
          <t>E.g. "1985-04-12T23:59:59.52Z" represents a moment just before April 5th, 1985
                    in Coordinated Universal Time (UTC).</t>
          <t>Such values are indicated with the "TIMESTAMP" type annotation in the model.</t>
        </section>
        <section>
          <name>Geographical Locations</name>
          <t>Some attributes inside the IDMEF data model may refer to geographical locations
                    using a set of coordinates. The reference system for all geographical coordinates
                    is a geographic coordinate reference system, using the World Geodetic System 1984
                    <xref target="WGS84"/>. The reference system used is the same as for the Global Positioning
                    System (GPS).</t>
          <t>The format for such values can be either "latitude,longitude" or "latitude,longitude,altitude".
                    Each of these coordinates is represented as a floating-point value. The latitude and longitude
                    are expressed in degrees while the altitude is expressed in meters.</t>
          <t>E.g. "48.8584,2.2945,276.13" matches the (3-dimensional) geographical location
                    for the top floor or the Eiffel Tower located in Paris, France, while "48.8584,2.2945"
                    matches the same location in two dimensions (with the altitude removed).</t>
          <t>Such values are indicated with the "GEOLOC" type annotation in the model.</t>
        </section>
        <section>
          <name>UNECE Location Codes (UN/LOCODE)</name>
          <t>Some attributes inside the IDMEF data model may refer to geographical locations
                    using Locations Codes. These codes can be assimilated to an enumeration, where the
                    list of possible values is defined in the United Nations Economic Commission
                    for Europe (UNECE) Codes for Trade <xref target="UN-LOCODE"/>.</t>
          <t>E.g. "FR PAR" is the Location Code for the city of Paris, France.</t>
          <t>Such values are indicated with the "UNLOCODE" type annotation in the model.</t>
        </section>
        <section>
          <name>Uniform Resource Identifiers (URIs)</name>
          <t>The IDMEF data model uses Uniform Resource Identifiers (URIs), as defined in
                    <xref target="RFC3986"/>, when referring to external resources.
                    Unless otherwise specified, either a Uniform Resource Location (URL) or
                    a Uniform Resource Name (URN) may be used where a URI is expected.</t>
          <t>E.g. both "https://example.com/resource" and "urn:myapp:resource" are valid
                    Uniform Resource Identifiers.</t>
          <t>Such values are indicated with the "URI" type annotation in the model.</t>
        </section>
        <section>
          <name>IP Addresses</name>
          <t>IP addresses inside the IDMEF data model are expressed as strings using the
                    traditional dotted-decimal notation for IPv4 addresses (defined by the
                    "dotnum" production rule in the grammar in <xref target="RFC5321"/>),
                    while IPv6 addresses are expressed using the text representation defined in
                    <xref target="RFC4291"/> ch 2.2.</t>
          <t>E.g. "192.0.2.1" represents a valid IPv4 address, while "::1/128" represents
                    a valid IPv6 address.</t>
          <t>It is RECOMMENDED that implementations follow the recommendations for IPv6
                    text representation stated in <xref target="RFC5952"/>.</t>
          <t>Such values are indicated with the "IP" type annotation in the model.</t>
        </section>
        <section>
          <name>E-mail addresses</name>
          <t>E-mail addresses inside the IDMEF data model are expressed as strings
                    using the address specification syntax defined in <xref target="RFC5322"/> ch 3.4.1.</t>
          <t>E.g. "root@example.com".</t>
          <t>Such values are indicated with the "EMAIL" type annotation in the model.</t>
        </section>
        <section>
          <name>Attachment names</name>
          <t>Attachments inside the IDMEF data model are identified using
                    a unique name, composed of a string whose character set is limited to the ASCII
                    letters (A-Z a-z) and digits (0-9).</t>
          <t>E.g. "state" is a valid name for an attachment.</t>
          <t>The constraint on name unicity is enforced per class. That is,
                    but it is not
                    possible for two attachments to share the same name inside the same alert.</t>
          <t>Such values are indicated with the "ID" type annotation in the model.</t>
        </section>
        <section>
          <name>Media types</name>
          <t>Media types are used in the IDMEF data model to describe an attachment's content.
                    The syntax for such values is defined in <xref target="RFC2046"/>.</t>
          <t>IANA keeps a list of all currently registered media types in the Media Types
                    registry .</t>
          <t>E.g. "application/xml" or "text/plain; charset=utf-8".</t>
          <t>Such values are indicated with the "MEDIATYPE" type annotation in the model.</t>
        </section>
        <section>
          <name>Universally Unique IDentifiers (UUIDs)</name>
          <t>Universally Unique Identifiers (UUIDs) are used to uniquely identify IDMEF messages.
                    It is also possible for an IDMEF message to reference other IDMEF messages using
                    their UUIDs. The syntax for UUIDs is defined in <xref target="RFC4122"/>.</t>
          <t>To limit the risk of UUID collisions, implementors SHOULD NOT generate version 4
                    UUIDs (randomly or pseudo-randomly generated UUIDs).</t>
          <t>E.g. "ba2e4ef4-8719-42bb-a712-d6e8871c5c5a".</t>
          <t>UUIDs are case-insensitive when used in comparisons.</t>
          <t>Such values are indicated with the "UUID" type annotation in the model.</t>
        </section>
        <section>
          <name>Protocol Names</name>
          <t>Such values are indicated with the "PROTOCOL" type annotation in the model.</t>
        </section>
        <section>
          <name>IDMEF Paths</name>
          <t>This document defines a way to represent the path to every possible attribute
                    inside an IDMEF message. For conciseness, the top-level "Alert" class is omitted
                    from the path.</t>
          <t>This representation can be used in contexts where the path to an IDMEF attribute
                    is expected. An example of such usage can be seen in the definition of the
                    "AggrCondition" attribute inside the <xref target="class_alert">Alert class</xref>.</t>
          <t>The syntax for these IDMEF paths is expressed in the following ABNF grammar:</t>
          <sourcecode type="none">class-name      =  "Analyzer" / "Sensor" / "Source" / "Target" /
                   "Attachment"
attribute-name  =  1*ALPHA
class-reference =  class-name "."
num             =  *1"-" 1*DIGIT
list-index      =  "(" num ")"
path            =  *1class-reference attribute-name *1list-index</sourcecode>
          <t>Valid attribute names are limited to those defined for the specified
                    class-reference (or in the top-level "Alert" class if class-reference
                    is omitted).</t>
          <t>For example, the following path refers to the "CeaseTime" attribute
                    of the top-level "Alert" class: "CeaseTime".</t>
          <t>Likewise, the following path refers to the "Name" attribute of the
                    "Analyzer" class: "Analyzer.Name".</t>
          <t>For attributes defined as lists (see <xref target="data-types-lists"/>), the path may
                    include the (0-based) index for an entry inside the list.
                    The index defaults to 0 if omitted.
                    This means that several (valid) representations may be used to reference
                    the same IDMEF attribute when list attributes are involved.</t>
          <t>For example, both of the following paths refer to the IP address of the first
                    source associated with an IDMEF message:</t>
          <sourcecode type="none">Source.IP
Source(0).IP</sourcecode>
          <t>Compatible implementations MUST reject paths that reference an unknown
                    class, an unknown attribute, or use a list-index for an IDMEF field
                    which is not defined as a list.</t>
          <t>A compatible implementation MUST also normalize paths before comparing them
                    (e.g. by stripping the text "(0)" from paths referring to list attributes).</t>
        </section>
        <section>
          <name>Hashes</name>
          <t>Hashes are sometimes used inside the data model to protect the integrity
                    (and optionally, authenticity) of attachments.</t>
          <t>The syntax for these values is "function:hash_result", where "function" refers to
                    one of the hashing function names listed in 
                    and "hash_result" contains the hexadecimal notation for the hash result obtained
                    by calling the specified hash function on the input value.</t>
          <t>In the context of IDMEF, either a keyless or keyed hash function may be used
                    to process the raw input value.</t>
          <t>E.g. "sha256:a02735ed8b10ad432d557bd4849c0dac3b23d64706e0618716d6df2def338374"</t>
          <t>Hashes are case-insensitive when used in comparisons.</t>
          <t>Such values are indicated with the "HASH" type annotation in the model.</t>
        </section>
      </section>
      <section anchor="data-types-lists">
        <name>Lists</name>
        <t>Some attributes of the IDMEF data model accept ordered lists of values.</t>
        <t>Such ordered lists are indicated with the "X[]" type annotation in the model.
                where "X" refers to one of the data types defined in <xref target="data-types"/>.
                For example, "ENUM[]" refers to an ordered list of enumeration values.</t>
      </section>
    </section>
    <section>
      <name>The IDMEF extension</name>
      <t>In order to support the dynamic nature of security operations and
            to adapt to specific needs, the
            IDMEFv2  data model will need to continue to evolve.  This section
            discusses how new data elements can be incorporated into the IDMEFv2.
            There is support to add additional enumerated values and new attributes.</t>
      <t>These extension mechanisms are designed so that adding new data
            elements is possible without requiring modifications to this
            document.  Extensions can be implemented publicly or privately.  With
            proven value, well-documented extensions can be incorporated into
            future versions of the specification.</t>
      <section>
        <name>Extending the Enumerated Values of Attributes</name>
        <t>Additional enumerated values can be added to select attributes either
                through the use of specially marked attributes with the "ext-" prefix
                or through a set of corresponding IANA registries.  The former
                approach allows for the extension to remain private.  The latter
                approach is public.</t>
        <section anchor="private-extension-enum">
          <name>Private Extension of Enumerated Values</name>
          <t>The data model supports adding new enumerated values to an attribute
                    without public registration.  For each attribute that supports this
                    extension technique, there is a corresponding attribute in the same
                    element whose name is identical but with a prefix of "ext-".  This
                    special attribute is referred to as the extension attribute.  The
                    attribute being extended is referred to as an extensible attribute.
                    For example, an extensible attribute named "foo" will have a
                    corresponding extension attribute named "ext-foo".  An element may
                    have many extensible attributes.</t>
          <t>In addition to a corresponding extension attribute, each extensible
                    attribute has "ext-value" as one its possible enumerated values.
                    Selection of this particular value in an extensible attribute signals
                    that the extension attribute contains data.  Otherwise, this
                    "ext-value" value has no meaning.</t>
          <t>In order to add a new enumerated value to an extensible attribute,
                    the value of this attribute MUST be set to "ext-value", and the new
                    desired value MUST be set in the corresponding extension attribute.
                    For example, extending the Category  attribute of the Analyzer class
                    would look as follows:</t>
          <sourcecode type="json">Analyzer: {
    ...
    "Category":["ext-value"],
    "ext-Category": "my-new-analyzer-category",
    ....
}</sourcecode>
          <t>A given extension attribute MUST NOT be set unless the corresponding
                    extensible attribute has been set to "ext-value".</t>
        </section>
        <section>
          <name>Public Extension of Enumerated Values</name>
          <t>The data model also supports publicly extending select enumerated
                    attributes.  A new entry can be added by registering a new entry in
                    the appropriate IANA registry. Section (<xref target="iana-registries"/>) provides a mapping
                    between the extensible attributes and their corresponding registry.</t>
        </section>
      </section>
      <section>
        <name>Private Extension of Attributes</name>
        <t>Use of new attributes is possible through the use of the attachment class.
                New attributes and their corresponding values should be stored in the Content
                attribute of an Attachment and the ContentEncoding must be set to JSON.
                For example creating a new attribute to store the email of the operator (in
                charge of solving the incident) will look as follows:</t>
        <sourcecode type="json">"Attachment" : [
    {
    "Name": "Operator",
    "ContentEnconding": "JSON",
    "Content": "{\"OperatorMail\":\"John.Does@acme.com\"}",
    }
[</sourcecode>
      </section>
    </section>
    <section anchor="model">
      <name>The IDMEF Data Model</name>
      <t>In this section, the individual components of the IDMEF data model will be discussed in detail.  For each class, the semantics will be described.</t>
      <section>
        <name>Overview</name>
        <figure anchor="overview-classes">
          <name>IDMEFv2 Overview Classes</name>
          <artwork type="ascii-art" align="center">                         +--------+     +-----+
                         |Analyzer|---&gt; |Alert|
                         +--------+     +-----+
                             ||
                          +------+
                          |Sensor|
                          +------+
                             /\
                            /  \
                           /    \
+------+                  +------+
|Source|    &gt;------&gt;      |Target|
+------+                  +------+</artwork>
        </figure>
        <t>An IDMEF message is composed of an instance of the <xref target="class_alert">Alert class</xref> representing
                the overall properties of the message. It also contains exactly one instance of the
                <xref target="class_analyzer">Analyzer class</xref> and zero or more instances of the <xref target="class_sensor">Sensor class</xref>.  The message may also describe various aspects of an event using the <xref target="class_source">Source</xref> and <xref target="class_target">Target</xref>  classes.</t>
        <t>Last but not least, it may also include zero or more instances of the
                <xref target="class_attachment">Attachment class</xref>, e.g. captured files or network packets related
                to the event for example.</t>
        <t>The relationship between the main Alert class and other classes of the data model
                is shown in <xref target="diagram-classes"/> (attributes are omitted for clarity).</t>
        <figure anchor="diagram-classes">
          <name>IDMEFv2 Classes</name>
          <artwork type="ascii-art" align="center">+-------+            +-------------
| Alert |&lt;&gt;----------|  Analyzer  |
+-------+            +------------+
|       |       0..* +------------+
|       |&lt;&gt;----------|   Sensor   |
|       |            +------------+
|       |       0..* +------------+
|       |&lt;&gt;----------|   Source   |
|       |            +------------+
|       |       0..* +------------+
|       |&lt;&gt;----------|   Target   |
|       |            +------------+
|       |       0..* +------------+
|       |&lt;&gt;----------| Attachment |
+-------+            +------------+</artwork>
        </figure>
        <t>It is important to note that the data model does not specify how an incident
                should be categorized or identified.
                For example, an attacker scanning a network for machines listening on a specific
                port may be identified by one analyzer as a single attack against multiple targets,
                while another analyzer may identify it as multiple attacks from a single source.
                However, once an analyzer has determined the type of alert it plans on sending,
                the data model dictates how that alert should be formatted.</t>
      </section>
      <section anchor="class_alert">
        <name>The Alert Class</name>
        <t>The Alert class contains high level information about the event that triggered the alert.</t>
        <figure anchor="class_alert_diagram">
          <name>The Alert class</name>
          <artwork type="ascii-art" align="center">+------------------------------+
|              Alert           |
+------------------------------+
| STRING      Version          |
| UUID        ID               |
| STRING      OrganisationName |
| STRING      OrganisationId   |
| STRING      EntityName       |
| STRING      EntityId         |
| ENUM[]      EntitySector     |
| ENUM[]      Type             |
| ENUM[]      Category         |
| STRING[]    ext-Category     |
| ENUM        Cause            |
| STRING      Description      |
| ENUM        Status           |
| ENUM        Priority         |
| FLOAT       Confidence       |
| STRING      Note             |
| TIMESTAMP   CreateTime       |
| TIMESTAMP   StartTime        |
| TIMESTAMP   EndTime          |
| STRING[]    AltNames         |
| STRING[]    AltCategory      |
| URI[]       Ref              |
| UUID[]      CorrelID         |
| CONDITION[] AggrCondition    |
| UUID[]      PredID           |
| UUID[]      RelID            |
+------------------------------+</artwork>
        </figure>
        <t>The aggregate classes that make up Alert are:</t>
        <dl newline="true">
                    <dt>Analyzer</dt>
                    <dd>
                        <t>Exactly one.
                            An instance of the <xref target="class_analyzer">Analyzer class</xref> that describes the
                            tool/device responsible for the analysis that resulted in the alert being
                            created and sent.</t>
                    </dd>
                
                    <dt>Sensor</dt>
                    <dd>
                        <t>Zero or more.
                            Instances of the <xref target="class_sensor">Sensor class</xref> used to describe the sensor(s)
                            that captured the information used during the analysis.</t>
                        <t>Depending on the tools/devices used to detect incidents, an Analyzer may rely
                            on the output from a single sensor or from multiple sensors to generate alerts.
                            In addition, the Analyzer and Sensor may actually be part of the same physical
                            device and may share some of their attributes (e.g. IP, Hostname, Model, etc.).</t>
                    </dd>
                
                    <dt>Source</dt>
                    <dd>
                        <t>Zero or more.
                            Instances of the <xref target="class_source">Source class</xref> used to describe the source(s)
                            of the incident (e.g. attackers, faulty device, etc.).</t>
                    </dd>
                
                    <dt>Target</dt>
                    <dd>
                        <t>Zero or more.
                            Instances of the <xref target="class_target">Target class</xref> used to describe the target(s)
                            of the incident, i.e. the impacted devices/users/services/locations.</t>
                    </dd>
                
                    <dt>Attachment</dt>
                    <dd>
                        <t>Zero or more.
                            Instances of the <xref target="class_attachment">Attachment class</xref> used to describe
                            the electronic artifacts captured in relation with the event.</t>
                        <t>The intent of the Attachment class is to keep track of the electronic files
                            left as a trail during the event.
                            This may include things like on-disk files (e.g. malware samples), network
                            packet captures, videos or still images from a camera feed, voice recording, etc.</t>
                    </dd>
                </dl>
        <t>The Alert class has the following attributes:</t>
        <dl newline="true">
                    <dt>Version</dt>
                    <dd>
                        <t>Mandatory.
                            The version of the IDMEF format in use by this alert.</t>
                        <t>During the drafts tuning period the version is equal to the draft version.
                            Therefore it is "2.D.V0X" for Draft V0X.</t>
                    </dd>
                
                    <dt>ID</dt>
                    <dd>
                        <t>Mandatory.
                            Unique identifier for the alert.</t>
                    </dd>
                
                    <dt>OrganisationName</dt>
                    <dd>
                        <t>Optional. Corporate/Main Office Organisation Name</t>
                        <t>Useful if alerts are sent to a multi-organisation central incident detection manager.</t>
                        <t>Example: ACME Corporation</t>
                    </dd>
                
                    <dt>OrganisationId</dt>
                    <dd>
                        <t>Optional.  Corporate/Main Office Organisation ID. Where possible official organisation ID manage by national authority.</t>
                        <t>Useful if alerts are sent to a multi-organisation central incident detection manager.</t>
                        <t>This ID has to be chosen depending on the overall detection perimeter and the nature of the monitored organisation (Private/Public, Commercial, International, etc.)</t>
                        <t>Examples: OrganisationId in France could be SIREN, in England could be CR, Germany could be  Handelsregisternummer, Spain could be CIF, Italia could be Partita IVA, USA could be EIN, etc.  Commercial OrganisationId in Europe could be V.A.T ID</t>
                    </dd>
                
                    <dt>EntityName</dt>
                    <dd>
                        <t>Optional. Entity Name, monitored by the organisation, where the incident occurred.</t>
                        <t>Could be a town, region or country name or an internal name.  Could also be the name of a client for a MSSP centralizing it's client incidents in a single system.</t>
                        <t>Do not repeat the organisation name in the EntityName</t>
                        <t>Example:</t>
                        <t>- ACME HeadQuaters is located in Paris France and has a local office in India</t>
                        <t>- If the incident occurred in the local office: "OrganisationName": "ACME" , "EntityName": "India"</t>
                        <t>- If the incident occurred in the headquaters: "OrganisationName": "ACME", "EntityName": "Headquaters" (or "Paris")</t>
                    </dd>
                
                    <dt>EntityId</dt>
                    <dd>
                        <t>Optional. Entity ID, monitored by the organisation, where the incident occurred.</t>
                        <t>Useful if organisation and entity are not directly linked, like a client and a MSSP.</t>
                    </dd>
                
                    <dt>EntitySector</dt>
                    <dd>
                        <t>Optional. The economic sector(s) and sub-sector(s) in which the entity operates. Values follow the dot notation sector.subsector based on the critical infrastructure taxonomy defined in the NIS2 Directive and CER (Critical Entities Resilience) Directive.</t>
                        <t>This attribute enables sector-based correlation, regulatory compliance reporting, and risk context for incident detection.</t>
                        <table><name>EntitySector</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Undefined</t>
                                        </td>
                                        <td>
                                            <t>Sector undefined</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>Banking.Banking</t>
                                        </td>
                                        <td>
                                            <t>Banking institutions and credit activities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Banking.Other</t>
                                        </td>
                                        <td>
                                            <t>Other banking and financial entities critical for the stability of the financial system</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Cemeteries.Crematoria</t>
                                        </td>
                                        <td>
                                            <t>Crematoria operations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>Cemeteries.PublicCemeteries</t>
                                        </td>
                                        <td>
                                            <t>Public cemetery and crematorium facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>5</t>
                                        </td>
                                        <td>
                                            <t>Cemeteries.Other</t>
                                        </td>
                                        <td>
                                            <t>Other cemetery and funeral service entities critical for public health and social continuity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>6</t>
                                        </td>
                                        <td>
                                            <t>Chemical.ChemicalProduction</t>
                                        </td>
                                        <td>
                                            <t>Production of hazardous and high-consequence chemicals</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>7</t>
                                        </td>
                                        <td>
                                            <t>Chemical.Storage</t>
                                        </td>
                                        <td>
                                            <t>Chemical storage and distribution facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>8</t>
                                        </td>
                                        <td>
                                            <t>Chemical.Other</t>
                                        </td>
                                        <td>
                                            <t>Other chemical sector entities critical for safety and security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>9</t>
                                        </td>
                                        <td>
                                            <t>CivilSociety.ElectionMonitoring</t>
                                        </td>
                                        <td>
                                            <t>Election observation and monitoring entities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>10</t>
                                        </td>
                                        <td>
                                            <t>CivilSociety.HumanitarianAid</t>
                                        </td>
                                        <td>
                                            <t>Humanitarian aid organizations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>11</t>
                                        </td>
                                        <td>
                                            <t>CivilSociety.NGOs</t>
                                        </td>
                                        <td>
                                            <t>Non-governmental organizations with critical functions</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>12</t>
                                        </td>
                                        <td>
                                            <t>CivilSociety.Other</t>
                                        </td>
                                        <td>
                                            <t>Other civil society entities critical for democratic processes and social stability</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>13</t>
                                        </td>
                                        <td>
                                            <t>CulturalHeritage.Archives</t>
                                        </td>
                                        <td>
                                            <t>National and regional archives</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>14</t>
                                        </td>
                                        <td>
                                            <t>CulturalHeritage.HistoricalSites</t>
                                        </td>
                                        <td>
                                            <t>Historical monuments and archaeological sites</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>15</t>
                                        </td>
                                        <td>
                                            <t>CulturalHeritage.Libraries</t>
                                        </td>
                                        <td>
                                            <t>National and public libraries</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>16</t>
                                        </td>
                                        <td>
                                            <t>CulturalHeritage.Museums</t>
                                        </td>
                                        <td>
                                            <t>Museums and exhibition spaces</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>17</t>
                                        </td>
                                        <td>
                                            <t>CulturalHeritage.Other</t>
                                        </td>
                                        <td>
                                            <t>Other cultural heritage entities critical for national identity and continuity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>18</t>
                                        </td>
                                        <td>
                                            <t>Defense.CommandControl</t>
                                        </td>
                                        <td>
                                            <t>Military C4ISR systems (command, control, communications, computers, intelligence, surveillance, reconnaissance)</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>19</t>
                                        </td>
                                        <td>
                                            <t>Defense.CyberDefense</t>
                                        </td>
                                        <td>
                                            <t>Military cyber defense and security operations centers</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>20</t>
                                        </td>
                                        <td>
                                            <t>Defense.DefenseIndustrialBase</t>
                                        </td>
                                        <td>
                                            <t>Defense manufacturing, weapons systems, munitions production</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>21</t>
                                        </td>
                                        <td>
                                            <t>Defense.Logistics</t>
                                        </td>
                                        <td>
                                            <t>Military supply chains, fuel depots, ammunition storage</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>22</t>
                                        </td>
                                        <td>
                                            <t>Defense.MilitaryInstallations</t>
                                        </td>
                                        <td>
                                            <t>Military bases, headquarters, and operational facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>23</t>
                                        </td>
                                        <td>
                                            <t>Defense.Research</t>
                                        </td>
                                        <td>
                                            <t>Defense laboratories and R&amp;D facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>24</t>
                                        </td>
                                        <td>
                                            <t>Defense.Other</t>
                                        </td>
                                        <td>
                                            <t>Other defense and military entities critical for national security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>25</t>
                                        </td>
                                        <td>
                                            <t>Digital.CloudServices</t>
                                        </td>
                                        <td>
                                            <t>Cloud computing and critical digital services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>26</t>
                                        </td>
                                        <td>
                                            <t>Digital.DataCenters</t>
                                        </td>
                                        <td>
                                            <t>Data center hosting and infrastructure services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>27</t>
                                        </td>
                                        <td>
                                            <t>Digital.DigitalProviders</t>
                                        </td>
                                        <td>
                                            <t>Online marketplaces, search engines and social media platforms</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>28</t>
                                        </td>
                                        <td>
                                            <t>Digital.DomainNameSystems</t>
                                        </td>
                                        <td>
                                            <t>DNS service providers and TLD registries</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>29</t>
                                        </td>
                                        <td>
                                            <t>Digital.ICTServiceManagement</t>
                                        </td>
                                        <td>
                                            <t>ICT service management B2B services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>30</t>
                                        </td>
                                        <td>
                                            <t>Digital.SatelliteCommunications</t>
                                        </td>
                                        <td>
                                            <t>Satellite communication networks and ground stations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>31</t>
                                        </td>
                                        <td>
                                            <t>Digital.TelecomNetworks</t>
                                        </td>
                                        <td>
                                            <t>Fixed and mobile telecommunications networks</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>32</t>
                                        </td>
                                        <td>
                                            <t>Digital.UnderseaCables</t>
                                        </td>
                                        <td>
                                            <t>Submarine communications cable infrastructure</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>33</t>
                                        </td>
                                        <td>
                                            <t>Digital.Other</t>
                                        </td>
                                        <td>
                                            <t>Other digital and telecommunications entities critical for the continuity of digital services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>34</t>
                                        </td>
                                        <td>
                                            <t>Education.PrimarySecondary</t>
                                        </td>
                                        <td>
                                            <t>Primary and secondary schools</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>35</t>
                                        </td>
                                        <td>
                                            <t>Education.ResearchSchools</t>
                                        </td>
                                        <td>
                                            <t>Research-focused educational institutions</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>36</t>
                                        </td>
                                        <td>
                                            <t>Education.Universities</t>
                                        </td>
                                        <td>
                                            <t>Universities and higher education institutions</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>37</t>
                                        </td>
                                        <td>
                                            <t>Education.Other</t>
                                        </td>
                                        <td>
                                            <t>Other educational entities critical for societal continuity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>38</t>
                                        </td>
                                        <td>
                                            <t>EmergencyServices.CivilProtection</t>
                                        </td>
                                        <td>
                                            <t>Civil protection and disaster management agencies</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>39</t>
                                        </td>
                                        <td>
                                            <t>EmergencyServices.EmergencyMedical</t>
                                        </td>
                                        <td>
                                            <t>Ambulance services and emergency medical response</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>40</t>
                                        </td>
                                        <td>
                                            <t>EmergencyServices.FireAndRescue</t>
                                        </td>
                                        <td>
                                            <t>Firefighting and rescue services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>41</t>
                                        </td>
                                        <td>
                                            <t>EmergencyServices.Police</t>
                                        </td>
                                        <td>
                                            <t>Law enforcement agencies and operations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>42</t>
                                        </td>
                                        <td>
                                            <t>EmergencyServices.Other</t>
                                        </td>
                                        <td>
                                            <t>Other emergency response entities critical for public safety</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>43</t>
                                        </td>
                                        <td>
                                            <t>Energy.DistrictHeating</t>
                                        </td>
                                        <td>
                                            <t>Operation of district heating networks</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>44</t>
                                        </td>
                                        <td>
                                            <t>Energy.Electricity</t>
                                        </td>
                                        <td>
                                            <t>Generation, transmission and distribution of electrical power</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>45</t>
                                        </td>
                                        <td>
                                            <t>Energy.Gas</t>
                                        </td>
                                        <td>
                                            <t>Transport, storage and distribution of natural gas</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>46</t>
                                        </td>
                                        <td>
                                            <t>Energy.Hydrogen</t>
                                        </td>
                                        <td>
                                            <t>Production, transport and storage of hydrogen</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>47</t>
                                        </td>
                                        <td>
                                            <t>Energy.Nuclear</t>
                                        </td>
                                        <td>
                                            <t>Nuclear power generation and fuel cycle facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>48</t>
                                        </td>
                                        <td>
                                            <t>Energy.Oil</t>
                                        </td>
                                        <td>
                                            <t>Refining, transport and storage of petroleum products</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>49</t>
                                        </td>
                                        <td>
                                            <t>Energy.Other</t>
                                        </td>
                                        <td>
                                            <t>Other energy entities critical for the continuity of energy supply</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>50</t>
                                        </td>
                                        <td>
                                            <t>Finance.FinancialMarketInfrastructures</t>
                                        </td>
                                        <td>
                                            <t>Stock exchanges and clearing houses</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>51</t>
                                        </td>
                                        <td>
                                            <t>Finance.Insurance</t>
                                        </td>
                                        <td>
                                            <t>Systemically important insurance entities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>52</t>
                                        </td>
                                        <td>
                                            <t>Finance.PaymentSystems</t>
                                        </td>
                                        <td>
                                            <t>Card schemes, transfers and instant payment systems</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>53</t>
                                        </td>
                                        <td>
                                            <t>Finance.Other</t>
                                        </td>
                                        <td>
                                            <t>Other financial entities critical for the stability of the financial system</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>54</t>
                                        </td>
                                        <td>
                                            <t>Food.AgriculturalProduction</t>
                                        </td>
                                        <td>
                                            <t>Strategic agricultural and livestock production</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>55</t>
                                        </td>
                                        <td>
                                            <t>Food.FoodDistribution</t>
                                        </td>
                                        <td>
                                            <t>Retail and logistics for food supply chains</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>56</t>
                                        </td>
                                        <td>
                                            <t>Food.FoodProcessing</t>
                                        </td>
                                        <td>
                                            <t>Industrial food processing and manufacturing</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>57</t>
                                        </td>
                                        <td>
                                            <t>Food.FoodSafety</t>
                                        </td>
                                        <td>
                                            <t>Food safety inspection and control authorities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>58</t>
                                        </td>
                                        <td>
                                            <t>Food.Other</t>
                                        </td>
                                        <td>
                                            <t>Other food sector entities critical for the continuity of the food supply chain</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>59</t>
                                        </td>
                                        <td>
                                            <t>Health.BloodAndTissue</t>
                                        </td>
                                        <td>
                                            <t>Blood banks, tissue banks, and transplantation services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>60</t>
                                        </td>
                                        <td>
                                            <t>Health.HealthcareProviders</t>
                                        </td>
                                        <td>
                                            <t>Hospitals and clinics providing essential care</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>61</t>
                                        </td>
                                        <td>
                                            <t>Health.Laboratories</t>
                                        </td>
                                        <td>
                                            <t>Medical analysis and diagnostic laboratories</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>62</t>
                                        </td>
                                        <td>
                                            <t>Health.MedicalDevices</t>
                                        </td>
                                        <td>
                                            <t>Manufacture and maintenance of critical medical devices</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>63</t>
                                        </td>
                                        <td>
                                            <t>Health.PharmaceuticalSupplyChain</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing, wholesale and distribution of pharmaceuticals</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>64</t>
                                        </td>
                                        <td>
                                            <t>Health.PublicHealth</t>
                                        </td>
                                        <td>
                                            <t>Public health agencies and epidemiological surveillance</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>65</t>
                                        </td>
                                        <td>
                                            <t>Health.Other</t>
                                        </td>
                                        <td>
                                            <t>Other health entities critical for the continuity of healthcare services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>66</t>
                                        </td>
                                        <td>
                                            <t>Logistics.FreightForwarding</t>
                                        </td>
                                        <td>
                                            <t>Freight forwarding and cargo management</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>67</t>
                                        </td>
                                        <td>
                                            <t>Logistics.LastMileDelivery</t>
                                        </td>
                                        <td>
                                            <t>Last-mile delivery services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>68</t>
                                        </td>
                                        <td>
                                            <t>Logistics.ThirdPartyLogistics</t>
                                        </td>
                                        <td>
                                            <t>Third-party logistics providers</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>69</t>
                                        </td>
                                        <td>
                                            <t>Logistics.Warehousing</t>
                                        </td>
                                        <td>
                                            <t>Strategic warehousing and storage facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>70</t>
                                        </td>
                                        <td>
                                            <t>Logistics.Other</t>
                                        </td>
                                        <td>
                                            <t>Other logistics entities critical for supply chain continuity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>71</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.Aerospace</t>
                                        </td>
                                        <td>
                                            <t>Aerospace and aviation manufacturing</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>72</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.Batteries</t>
                                        </td>
                                        <td>
                                            <t>Battery manufacturing and energy storage production</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>73</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.Chemical</t>
                                        </td>
                                        <td>
                                            <t>Chemical manufacturing and industrial processes</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>74</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.ComputerElectronicOptical</t>
                                        </td>
                                        <td>
                                            <t>Manufacture of computer, electronic and optical products</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>75</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.Defense</t>
                                        </td>
                                        <td>
                                            <t>Defense manufacturing and strategic military supply chains</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>76</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.MedicalDevices</t>
                                        </td>
                                        <td>
                                            <t>Manufacture of medical devices and equipment</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>77</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.MotorVehicles</t>
                                        </td>
                                        <td>
                                            <t>Manufacture of motor vehicles and transport equipment</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>78</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.Pharmaceutical</t>
                                        </td>
                                        <td>
                                            <t>Pharmaceutical manufacturing and active pharmaceutical ingredients</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>79</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.Semiconductors</t>
                                        </td>
                                        <td>
                                            <t>Semiconductor fabrication and microelectronics manufacturing</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>80</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.StrategicManufacturing</t>
                                        </td>
                                        <td>
                                            <t>Critical manufacturing such as metallurgy and components</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>81</t>
                                        </td>
                                        <td>
                                            <t>Manufacturing.Other</t>
                                        </td>
                                        <td>
                                            <t>Other manufacturing entities critical for industrial resilience and strategic supply chains</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>82</t>
                                        </td>
                                        <td>
                                            <t>MediaAndBroadcasting.BroadcastInfrastructure</t>
                                        </td>
                                        <td>
                                            <t>Transmitters, towers, and broadcast distribution infrastructure</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>83</t>
                                        </td>
                                        <td>
                                            <t>MediaAndBroadcasting.OnlineMedia</t>
                                        </td>
                                        <td>
                                            <t>Digital news platforms and content providers</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>84</t>
                                        </td>
                                        <td>
                                            <t>MediaAndBroadcasting.Press</t>
                                        </td>
                                        <td>
                                            <t>Newspapers, publishing houses, and press agencies</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>85</t>
                                        </td>
                                        <td>
                                            <t>MediaAndBroadcasting.Radio</t>
                                        </td>
                                        <td>
                                            <t>Radio broadcasting networks and studios</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>86</t>
                                        </td>
                                        <td>
                                            <t>MediaAndBroadcasting.Television</t>
                                        </td>
                                        <td>
                                            <t>Television broadcasting networks and studios</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>87</t>
                                        </td>
                                        <td>
                                            <t>MediaAndBroadcasting.Other</t>
                                        </td>
                                        <td>
                                            <t>Other media entities critical for information integrity and public communication</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>88</t>
                                        </td>
                                        <td>
                                            <t>Mining.CriticalRawMaterials</t>
                                        </td>
                                        <td>
                                            <t>Extraction and processing of critical raw materials</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>89</t>
                                        </td>
                                        <td>
                                            <t>Mining.EnergyMinerals</t>
                                        </td>
                                        <td>
                                            <t>Coal, uranium, and other energy mineral mining</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>90</t>
                                        </td>
                                        <td>
                                            <t>Mining.Other</t>
                                        </td>
                                        <td>
                                            <t>Other mining entities critical for resource security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>91</t>
                                        </td>
                                        <td>
                                            <t>Nuclear.FuelCycle</t>
                                        </td>
                                        <td>
                                            <t>Nuclear fuel production, enrichment, reprocessing, and waste management</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>92</t>
                                        </td>
                                        <td>
                                            <t>Nuclear.Medical</t>
                                        </td>
                                        <td>
                                            <t>Nuclear medical facilities and radioisotope production</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>93</t>
                                        </td>
                                        <td>
                                            <t>Nuclear.PowerGeneration</t>
                                        </td>
                                        <td>
                                            <t>Civil nuclear power plants and associated facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>94</t>
                                        </td>
                                        <td>
                                            <t>Nuclear.Research</t>
                                        </td>
                                        <td>
                                            <t>Nuclear research reactors and laboratories</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>95</t>
                                        </td>
                                        <td>
                                            <t>Nuclear.Other</t>
                                        </td>
                                        <td>
                                            <t>Other nuclear entities critical for safety and security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>96</t>
                                        </td>
                                        <td>
                                            <t>Postal.PostalCourierServices</t>
                                        </td>
                                        <td>
                                            <t>Postal and courier services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>97</t>
                                        </td>
                                        <td>
                                            <t>Postal.Other</t>
                                        </td>
                                        <td>
                                            <t>Other postal and courier entities critical for the continuity of mail and parcel services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>98</t>
                                        </td>
                                        <td>
                                            <t>PublicAdministration.CentralGovernment</t>
                                        </td>
                                        <td>
                                            <t>Central government ministries and agencies</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>99</t>
                                        </td>
                                        <td>
                                            <t>PublicAdministration.Diplomatic</t>
                                        </td>
                                        <td>
                                            <t>Embassies, consulates, and diplomatic missions</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>100</t>
                                        </td>
                                        <td>
                                            <t>PublicAdministration.EmergencyServices</t>
                                        </td>
                                        <td>
                                            <t>Police, fire, rescue, and emergency medical services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>101</t>
                                        </td>
                                        <td>
                                            <t>PublicAdministration.Judiciary</t>
                                        </td>
                                        <td>
                                            <t>Courts, judicial systems, and correctional facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>102</t>
                                        </td>
                                        <td>
                                            <t>PublicAdministration.LocalGovernment</t>
                                        </td>
                                        <td>
                                            <t>Regional and municipal public services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>103</t>
                                        </td>
                                        <td>
                                            <t>PublicAdministration.Other</t>
                                        </td>
                                        <td>
                                            <t>Other public administration entities critical for the continuity of public services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>104</t>
                                        </td>
                                        <td>
                                            <t>ReligiousSites.PilgrimageSites</t>
                                        </td>
                                        <td>
                                            <t>Major pilgrimage destinations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>105</t>
                                        </td>
                                        <td>
                                            <t>ReligiousSites.PlacesOfWorship</t>
                                        </td>
                                        <td>
                                            <t>Churches, mosques, synagogues, temples, and other religious buildings</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>106</t>
                                        </td>
                                        <td>
                                            <t>ReligiousSites.Other</t>
                                        </td>
                                        <td>
                                            <t>Other religious sites critical for community continuity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>107</t>
                                        </td>
                                        <td>
                                            <t>Research.BiologicalSafety</t>
                                        </td>
                                        <td>
                                            <t>BSL-3 and BSL-4 high-containment laboratories</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>108</t>
                                        </td>
                                        <td>
                                            <t>Research.ChemicalSafety</t>
                                        </td>
                                        <td>
                                            <t>High-containment chemical research facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>109</t>
                                        </td>
                                        <td>
                                            <t>Research.Research</t>
                                        </td>
                                        <td>
                                            <t>Key research laboratories with strategic importance</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>110</t>
                                        </td>
                                        <td>
                                            <t>Research.Other</t>
                                        </td>
                                        <td>
                                            <t>Other research entities critical for strategic research continuity and innovation</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>111</t>
                                        </td>
                                        <td>
                                            <t>Space.GroundStations</t>
                                        </td>
                                        <td>
                                            <t>Satellite ground control and telemetry stations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>112</t>
                                        </td>
                                        <td>
                                            <t>Space.LaunchFacilities</t>
                                        </td>
                                        <td>
                                            <t>Space launch sites and associated infrastructure</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>113</t>
                                        </td>
                                        <td>
                                            <t>Space.SpaceActivities</t>
                                        </td>
                                        <td>
                                            <t>Space industry and satellite operations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>114</t>
                                        </td>
                                        <td>
                                            <t>Space.Other</t>
                                        </td>
                                        <td>
                                            <t>Other space entities critical for the continuity of space-based services and infrastructure</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>115</t>
                                        </td>
                                        <td>
                                            <t>Transport.Aviation</t>
                                        </td>
                                        <td>
                                            <t>Airports, air traffic control and airline operations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>116</t>
                                        </td>
                                        <td>
                                            <t>Transport.Maritime</t>
                                        </td>
                                        <td>
                                            <t>Ports, terminals and maritime traffic management</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>117</t>
                                        </td>
                                        <td>
                                            <t>Transport.Pipeline</t>
                                        </td>
                                        <td>
                                            <t>Oil, gas, and hydrogen pipeline infrastructure</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>118</t>
                                        </td>
                                        <td>
                                            <t>Transport.PublicTransport</t>
                                        </td>
                                        <td>
                                            <t>Urban and regional public transportation systems</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>119</t>
                                        </td>
                                        <td>
                                            <t>Transport.Rail</t>
                                        </td>
                                        <td>
                                            <t>Railway infrastructure and train operations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>120</t>
                                        </td>
                                        <td>
                                            <t>Transport.Road</t>
                                        </td>
                                        <td>
                                            <t>Traffic management and strategic road logistics</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>121</t>
                                        </td>
                                        <td>
                                            <t>Transport.Other</t>
                                        </td>
                                        <td>
                                            <t>Other transport entities critical for the continuity of passenger and freight mobility</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>122</t>
                                        </td>
                                        <td>
                                            <t>Waste.HazardousWaste</t>
                                        </td>
                                        <td>
                                            <t>Collection, treatment and disposal of hazardous waste</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>123</t>
                                        </td>
                                        <td>
                                            <t>Waste.NonHazardousWaste</t>
                                        </td>
                                        <td>
                                            <t>Management of non-hazardous solid waste</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>124</t>
                                        </td>
                                        <td>
                                            <t>Waste.NuclearWaste</t>
                                        </td>
                                        <td>
                                            <t>Nuclear waste management and storage facilities</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>125</t>
                                        </td>
                                        <td>
                                            <t>Waste.Recycling</t>
                                        </td>
                                        <td>
                                            <t>Waste processing and recycling operations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>126</t>
                                        </td>
                                        <td>
                                            <t>Waste.Other</t>
                                        </td>
                                        <td>
                                            <t>Other waste management entities critical for the continuity of waste services</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>127</t>
                                        </td>
                                        <td>
                                            <t>Water.DamsAndReservoirs</t>
                                        </td>
                                        <td>
                                            <t>Dam and reservoir infrastructure for water management</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>128</t>
                                        </td>
                                        <td>
                                            <t>Water.DrinkingWater</t>
                                        </td>
                                        <td>
                                            <t>Capture, treatment and distribution of potable water</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>129</t>
                                        </td>
                                        <td>
                                            <t>Water.Irrigation</t>
                                        </td>
                                        <td>
                                            <t>Large-scale agricultural irrigation systems</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>130</t>
                                        </td>
                                        <td>
                                            <t>Water.Wastewater</t>
                                        </td>
                                        <td>
                                            <t>Collection and treatment of sewage and wastewater</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>131</t>
                                        </td>
                                        <td>
                                            <t>Water.Other</t>
                                        </td>
                                        <td>
                                            <t>Other water entities critical for the continuity of water supply and sanitation. (see <xref target="private-extension-enum"/>)</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>Type</dt>
                    <dd>
                        <t>Optional. Incident type.</t>
                        <table anchor="enum-alert-type"><name>Incident types</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Cyber</t>
                                        </td>
                                        <td>
                                            <t>Cyber incident</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>Physical</t>
                                        </td>
                                        <td>
                                            <t>Physical incident</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Availability</t>
                                        </td>
                                        <td>
                                            <t>Availability incident</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Combined</t>
                                        </td>
                                        <td>
                                            <t>Combined incident</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>Category</dt>
                    <dd>
                        <t>Optional. Incident category.</t>
                        <table anchor="enum-alert-category"><name>Incident categories</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Abuse.Grooming</t>
                                        </td>
                                        <td>
                                            <t>The process of deliberately building an emotional connection with a person to lower their inhibitions for the purpose of sexual abuse, exploitation, or trafficking.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>Abuse.Harassment</t>
                                        </td>
                                        <td>
                                            <t>A pattern of unwanted, intrusive behavior (physical, verbal, or online) directed at a specific person that causes fear, distress, or emotional harm.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Abuse.Coercion</t>
                                        </td>
                                        <td>
                                            <t>The practice of compelling an individual to act against their will by using force, threats, intimidation, or extreme dependency, often for personal or financial gain.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Abuse.Trafficking</t>
                                        </td>
                                        <td>
                                            <t>The act of recruiting, transporting, transferring, harboring, or receiving a person through force, fraud, or coercion for the purpose of exploitation, such as forced labor or sexual servitude.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>Abuse.Extermism</t>
                                        </td>
                                        <td>
                                            <t>The process of socializing an individual, often through psychological manipulation, to adopt the beliefs and goals of a violent extremist group and become willing to engage in activities that support the group.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>5</t>
                                        </td>
                                        <td>
                                            <t>Abuse.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident involving manipulation or coercion of people for harmful purposes that does not fit into the specific abuse subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>6</t>
                                        </td>
                                        <td>
                                            <t>Access.Compromise</t>
                                        </td>
                                        <td>
                                            <t>An incident where a legitimate user's credentials (e.g., username/password) are stolen or guessed and used by an unauthorized individual to gain access to systems or data.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>7</t>
                                        </td>
                                        <td>
                                            <t>Access.Escalation</t>
                                        </td>
                                        <td>
                                            <t>An incident where a user or process gains access rights, permissions, or capabilities that exceed those normally assigned, often to bypass security restrictions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>8</t>
                                        </td>
                                        <td>
                                            <t>Access.Backdoor</t>
                                        </td>
                                        <td>
                                            <t>The installation or discovery of a concealed method of bypassing normal authentication or encryption in a computer system, product, or embedded device.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>9</t>
                                        </td>
                                        <td>
                                            <t>Access.Unauthorized</t>
                                        </td>
                                        <td>
                                            <t>An incident involving physical entry into a restricted building, room, or area without proper authorization.This includes physical entry into a restricted building, room, or area, as well as digital access to systems, applications, networks, or data by an individual or process lacking valid credentials or authorization.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>10</t>
                                        </td>
                                        <td>
                                            <t>Access.Tailgating</t>
                                        </td>
                                        <td>
                                            <t>A physical security breach where an unauthorized person follows an authorized individual through a secured entry point, circumventing access control mechanisms.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>11</t>
                                        </td>
                                        <td>
                                            <t>Access.Forced</t>
                                        </td>
                                        <td>
                                            <t>An incident involving the use of physical force to breach a barrier (e.g., lock, door, window) or the repeated systematic guessing of passwords to gain unauthorized access.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>12</t>
                                        </td>
                                        <td>
                                            <t>Access.Lost</t>
                                        </td>
                                        <td>
                                            <t>An incident where physical or digital access credentials (e.g., keys, ID badges, login details) are misplaced, stolen, or used by an unauthorized person.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>13</t>
                                        </td>
                                        <td>
                                            <t>Access.Clonned</t>
                                        </td>
                                        <td>
                                            <t>The act of creating an unauthorized copy of a physical or digital security credential, such as an access card, to gain illicit entry to a facility or system.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>14</t>
                                        </td>
                                        <td>
                                            <t>Access.Authorized</t>
                                        </td>
                                        <td>
                                            <t>An incident involving legitimate, approved access to resources that may be relevant for auditing, monitoring, or establishing a baseline of normal activity.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>15</t>
                                        </td>
                                        <td>
                                            <t>Access.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident related to physical or digital access that does not fit into the specific access subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>16</t>
                                        </td>
                                        <td>
                                            <t>Availability.DoS</t>
                                        </td>
                                        <td>
                                            <t>An incident where a single machine or network attempts to make a system, service, or network resource unavailable by overwhelming it with malicious requests or traffic.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>17</t>
                                        </td>
                                        <td>
                                            <t>Availability.DDoS</t>
                                        </td>
                                        <td>
                                            <t>An incident where multiple compromised systems (a botnet) are used to target a single system with a flood of traffic, causing a denial of service.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>18</t>
                                        </td>
                                        <td>
                                            <t>Availability.Outage</t>
                                        </td>
                                        <td>
                                            <t>An incident where essential utilities or services (such as electricity, water, or network connectivity) become unavailable, disrupting normal operations.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>19</t>
                                        </td>
                                        <td>
                                            <t>Availability.Failure</t>
                                        </td>
                                        <td>
                                            <t>An incident caused by the unintentional malfunction of hardware or software due to errors, bugs, wear and tear, or other faults, leading to service degradation or unavailability.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>20</t>
                                        </td>
                                        <td>
                                            <t>Availability.Misconfiguration</t>
                                        </td>
                                        <td>
                                            <t>An incident where incorrect configuration of systems, software, or networks leads to service disruptions, outages, or security vulnerabilities.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>21</t>
                                        </td>
                                        <td>
                                            <t>Availability.Overload</t>
                                        </td>
                                        <td>
                                            <t>An incident where a system or component is subjected to a load beyond its designed capacity, leading to performance degradation or failure, even if the load is not malicious.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>22</t>
                                        </td>
                                        <td>
                                            <t>Availability.HeartBeat</t>
                                        </td>
                                        <td>
                                            <t>A periodic signal generated by hardware or software to indicate normal operation, often used for monitoring system health, connectivity, or location tracking.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>23</t>
                                        </td>
                                        <td>
                                            <t>Availability.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident that impacts the availability of resources or services, not covered by the specific subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>24</t>
                                        </td>
                                        <td>
                                            <t>Fraud.Usage</t>
                                        </td>
                                        <td>
                                            <t>The use of an organization's assets (e.g., computing power, network, email) for non-work-related, often illegal, activities without authorization.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>25</t>
                                        </td>
                                        <td>
                                            <t>Fraud.Copyright</t>
                                        </td>
                                        <td>
                                            <t>The act of reproducing, distributing, or installing software, media, or other materials in violation of their copyright, often for personal gain or distribution (piracy).</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>26</t>
                                        </td>
                                        <td>
                                            <t>Fraud.Masquerade</t>
                                        </td>
                                        <td>
                                            <t>A type of attack where an attacker illegitimately assumes the identity of another user, process, or system to gain unauthorized access, privileges, or benefits.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>27</t>
                                        </td>
                                        <td>
                                            <t>Fraud.Phishing</t>
                                        </td>
                                        <td>
                                            <t>A cyber attack where an attacker disguises themselves as a trustworthy entity (e.g., via email or fake website) to trick a victim into revealing sensitive information like usernames, passwords, or credit card details.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>28</t>
                                        </td>
                                        <td>
                                            <t>Fraud.Corruption</t>
                                        </td>
                                        <td>
                                            <t>A fraudulent scheme that is made possible by the abuse of power or position by a trusted individual (e.g., employee, official) who acts for personal gain.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>29</t>
                                        </td>
                                        <td>
                                            <t>Fraud.Espionnage</t>
                                        </td>
                                        <td>
                                            <t>The use of illegal or unethical means, such as hacking, bribery, or theft, to acquire a competitor's trade secrets, intellectual property, or other confidential business information.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>30</t>
                                        </td>
                                        <td>
                                            <t>Fraud.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident involving deception for financial or reputational gain that does not fit into the specific fraud subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>31</t>
                                        </td>
                                        <td>
                                            <t>Insider.Malicious</t>
                                        </td>
                                        <td>
                                            <t>A security incident caused by a current or former employee, contractor, or other trusted insider who intentionally acts to harm the organization, its data, or its people.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>32</t>
                                        </td>
                                        <td>
                                            <t>Insider.Negligent</t>
                                        </td>
                                        <td>
                                            <t>A security incident caused unintentionally by an insider, such as through carelessness, lack of awareness, or simple human error, leading to data exposure or system compromise.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>33</t>
                                        </td>
                                        <td>
                                            <t>Insider.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other security incident involving an insider (trusted individual) that does not fit into the specific insider threat subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>34</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Vandalism</t>
                                        </td>
                                        <td>
                                            <t>The deliberate and malicious act of damaging, destroying, or obstructing an organization's physical assets, operations, or systems.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>35</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Graffiti</t>
                                        </td>
                                        <td>
                                            <t>The act of willfully defacing, damaging, or marking public or private property with inscriptions, drawings, or tags without permission.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>36</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Destruction</t>
                                        </td>
                                        <td>
                                            <t>The intentional and malicious act of destroying or severely damaging physical assets, such as windows, equipment, or buildings.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>37</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Tampering</t>
                                        </td>
                                        <td>
                                            <t>The act of deliberately meddling with or disabling security controls (e.g., locks, alarms, cameras) to compromise their effectiveness.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>38</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Equipment</t>
                                        </td>
                                        <td>
                                            <t>The intentional act of causing damage to operational equipment, machinery, or vehicles, often to disrupt production or operations.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>39</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Disruption</t>
                                        </td>
                                        <td>
                                            <t>The intentional disruption of essential services or utilities, such as electricity, water, or network connectivity, to cause operational downtime.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>40</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Data</t>
                                        </td>
                                        <td>
                                            <t>The intentional act of deleting, altering, or corrupting digital or physical data to cause harm, disrupt operations, or cover tracks.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>41</t>
                                        </td>
                                        <td>
                                            <t>Sabotage.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident involving the intentional damage to property or assets not covered by the specific sabotage subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>42</t>
                                        </td>
                                        <td>
                                            <t>Safety.Explosion</t>
                                        </td>
                                        <td>
                                            <t>A sudden, violent release of energy (e.g., from gas, chemicals, or explosives) that causes a blast, fire, and potential structural damage, injury, or loss of life.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>43</t>
                                        </td>
                                        <td>
                                            <t>Safety.Fire</t>
                                        </td>
                                        <td>
                                            <t>An incident involving uncontrolled burning (e.g., structural, wildland, or chemical fire) that threatens human safety, property, or the environment.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>44</t>
                                        </td>
                                        <td>
                                            <t>Safety.Agression</t>
                                        </td>
                                        <td>
                                            <t>An incident where an individual uses physical force against another person, causing bodily harm, pain, or the fear of immediate harm.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>45</t>
                                        </td>
                                        <td>
                                            <t>Safety.Sexual</t>
                                        </td>
                                        <td>
                                            <t>An incident involving any unwanted sexual act, contact, or behavior directed against an individual without their consent.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>46</t>
                                        </td>
                                        <td>
                                            <t>Safety.Accident</t>
                                        </td>
                                        <td>
                                            <t>An unplanned, unforeseen event (e.g., vehicle crash, industrial mishap, chemical spill) that results in injury, loss of life, or damage to health.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>47</t>
                                        </td>
                                        <td>
                                            <t>Safety.Hostage</t>
                                        </td>
                                        <td>
                                            <t>An incident where a person or group is held against their will by a captor, often to compel a third party to meet certain demands.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>48</t>
                                        </td>
                                        <td>
                                            <t>Safety.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident that causes or has the potential to cause injury, loss of life, or endanger citizens, not covered by specific safety subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>49</t>
                                        </td>
                                        <td>
                                            <t>SupplyChain.Disruption</t>
                                        </td>
                                        <td>
                                            <t>An event that disrupts the normal flow of products, services, or information within a supply chain, often impacting operations and delivery.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>50</t>
                                        </td>
                                        <td>
                                            <t>SupplyChain.Compromise</t>
                                        </td>
                                        <td>
                                            <t>A security incident where an attacker exploits a vulnerability in a third-party vendor's system to gain access to or compromise the primary target's network or data.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>51</t>
                                        </td>
                                        <td>
                                            <t>SupplyChain.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident affecting the supply chain that does not fit into the specific supply chain subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>52</t>
                                        </td>
                                        <td>
                                            <t>Theft.Equiment</t>
                                        </td>
                                        <td>
                                            <t>The unlawful taking of physical hardware, such as computers, mobile phones, or servers, resulting in loss of assets and potentially the data they contain.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>53</t>
                                        </td>
                                        <td>
                                            <t>Theft.Data</t>
                                        </td>
                                        <td>
                                            <t>The unauthorized taking or copying of sensitive or confidential documents, whether in physical or digital form.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>54</t>
                                        </td>
                                        <td>
                                            <t>Theft.Machinery</t>
                                        </td>
                                        <td>
                                            <t>The unlawful taking of heavy equipment, vehicles, or specialized machinery, often resulting in significant operational and financial loss.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>55</t>
                                        </td>
                                        <td>
                                            <t>Theft.PII</t>
                                        </td>
                                        <td>
                                            <t>The unauthorized acquisition of Personally Identifiable Information (PII) that can be used to identify, contact, or impersonate an individual.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>56</t>
                                        </td>
                                        <td>
                                            <t>Theft.IP</t>
                                        </td>
                                        <td>
                                            <t>The unlawful acquisition of a company's intellectual property, including trade secrets, patents, formulas, or proprietary processes.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>57</t>
                                        </td>
                                        <td>
                                            <t>Theft.FinInfo</t>
                                        </td>
                                        <td>
                                            <t>The theft of financial information, such as credit card numbers or bank account details, often for the purpose of fraudulent transactions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>58</t>
                                        </td>
                                        <td>
                                            <t>Theft.Breaches</t>
                                        </td>
                                        <td>
                                            <t>A security incident involving the unauthorized access, acquisition, or disclosure of sensitive, protected, or confidential data.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>59</t>
                                        </td>
                                        <td>
                                            <t>Theft.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident involving the intentional stealing of physical property or digital data not covered by specific theft subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>60</t>
                                        </td>
                                        <td>
                                            <t>Operational.Misuse</t>
                                        </td>
                                        <td>
                                            <t>The use of an organization's assets (e.g., computers, network, time) for purposes that are not officially authorized, which may violate policy but not be malicious.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>61</t>
                                        </td>
                                        <td>
                                            <t>Operational.Policy Violation</t>
                                        </td>
                                        <td>
                                            <t>An incident where an individual fails to comply with established organizational policies, procedures, or security rules, whether intentionally or accidentally.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>62</t>
                                        </td>
                                        <td>
                                            <t>Operational.Process Failure</t>
                                        </td>
                                        <td>
                                            <t>An incident where a designed process, procedure, or workflow fails to achieve its intended outcome, leading to operational or security gaps.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>63</t>
                                        </td>
                                        <td>
                                            <t>Operational.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other operational issue that does not fit into the specific operational incident subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>64</t>
                                        </td>
                                        <td>
                                            <t>Recon.Netword</t>
                                        </td>
                                        <td>
                                            <t>The practice of probing a network to discover active hosts, open ports, and services, often as a precursor to an attack or unauthorized monitoring.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>65</t>
                                        </td>
                                        <td>
                                            <t>Recon.Landscape</t>
                                        </td>
                                        <td>
                                            <t>The act of physically observing a location to gather information about security measures, layouts, or potential vulnerabilities.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>66</t>
                                        </td>
                                        <td>
                                            <t>Recon.Aerial</t>
                                        </td>
                                        <td>
                                            <t>The act of using aerial platforms, such as drones or satellites, to conduct surveillance or gather intelligence about a target area.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>67</t>
                                        </td>
                                        <td>
                                            <t>Recon.OSINT</t>
                                        </td>
                                        <td>
                                            <t>The practice of collecting and analyzing information from publicly available sources (e.g., social media, public records) for intelligence purposes.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>68</t>
                                        </td>
                                        <td>
                                            <t>Recon.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident involving scanning, spying, or monitoring to identify resources that does not fit into specific recon subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>69</t>
                                        </td>
                                        <td>
                                            <t>National.Terrorism</t>
                                        </td>
                                        <td>
                                            <t>An incident involving the use of violence, intimidation, or threats by non-state actors against civilians or property to achieve political, religious, or ideological objectives.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>70</t>
                                        </td>
                                        <td>
                                            <t>National.Conflict</t>
                                        </td>
                                        <td>
                                            <t>A state of armed conflict between two or more nations, involving organized military forces and impacting national security.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>71</t>
                                        </td>
                                        <td>
                                            <t>National.Cyber</t>
                                        </td>
                                        <td>
                                            <t>Large-scale cyber operations, including attacks, espionage, and disinformation campaigns, conducted by state-sponsored or state-affiliated groups against national interests.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>72</t>
                                        </td>
                                        <td>
                                            <t>National.Crime</t>
                                        </td>
                                        <td>
                                            <t>Large-scale illegal activities, such as trafficking in drugs, weapons, or people, conducted by sophisticated criminal networks that pose a threat to national and international security.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>73</t>
                                        </td>
                                        <td>
                                            <t>National.Environemental</t>
                                        </td>
                                        <td>
                                            <t>Incidents related to large-scale environmental shifts, such as climate change, resource scarcity, or global pandemics, that have significant national security implications.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>74</t>
                                        </td>
                                        <td>
                                            <t>National.Economical</t>
                                        </td>
                                        <td>
                                            <t>An incident involving significant disruption to a nation's economy, such as market crashes, hyperinflation, or trade wars, affecting national stability.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>75</t>
                                        </td>
                                        <td>
                                            <t>National.Societal</t>
                                        </td>
                                        <td>
                                            <t>An incident involving large-scale public disorder, such as strikes, riots, or civil unrest, that challenges social order and may require national-level response.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>76</t>
                                        </td>
                                        <td>
                                            <t>National.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident that has a significant impact at the national scale, not covered by specific national security subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>77</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.Phishing</t>
                                        </td>
                                        <td>
                                            <t>A type of social engineering where attackers send fraudulent emails, appearing to be from a legitimate source, to trick recipients into revealing sensitive information or installing malware.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>78</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.Spear Phishing</t>
                                        </td>
                                        <td>
                                            <t>A highly targeted phishing attack directed at a specific individual, organization, or role, often using personalized information to increase credibility.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>79</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.Vishing</t>
                                        </td>
                                        <td>
                                            <t>A social engineering attack conducted over the phone, where the attacker impersonates a legitimate entity to trick the victim into revealing sensitive information or performing actions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>80</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.Smishing</t>
                                        </td>
                                        <td>
                                            <t>A social engineering attack conducted via SMS (text message), where the attacker sends a fraudulent message to trick the recipient into clicking a malicious link or providing information.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>81</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.Pretexting</t>
                                        </td>
                                        <td>
                                            <t>A social engineering tactic where the attacker creates a fabricated scenario or pretends to be someone they are not to engage a victim and extract information or access.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>82</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.Baiting</t>
                                        </td>
                                        <td>
                                            <t>A social engineering attack that lures victims by offering something desirable (e.g., free music, a prize) in exchange for information or by tricking them into downloading malware.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>83</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.QuidProQuo</t>
                                        </td>
                                        <td>
                                            <t>A social engineering tactic where the attacker offers a service or benefit (e.g., technical support) in exchange for information or access, often expecting something in return later.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>84</t>
                                        </td>
                                        <td>
                                            <t>SocialEng.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident involving psychological manipulation of people to divulge information or perform actions, not covered by specific social engineering subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>85</t>
                                        </td>
                                        <td>
                                            <t>Malware.Virus</t>
                                        </td>
                                        <td>
                                            <t>A type of malicious software that attaches itself to a legitimate program or file and replicates itself to spread to other programs, often requiring human action to propagate.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>86</t>
                                        </td>
                                        <td>
                                            <t>Malware.Worm</t>
                                        </td>
                                        <td>
                                            <t>A type of standalone malicious software that replicates itself to spread across networks, often exploiting vulnerabilities without requiring human interaction.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>87</t>
                                        </td>
                                        <td>
                                            <t>Malware.Trojan</t>
                                        </td>
                                        <td>
                                            <t>A type of malware that disguises itself as legitimate or desirable software to trick users into installing it, after which it can perform malicious actions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>88</t>
                                        </td>
                                        <td>
                                            <t>Malware.Ransomware</t>
                                        </td>
                                        <td>
                                            <t>A type of malware that encrypts a victim's files or systems, rendering them inaccessible, and demands a ransom payment, often in cryptocurrency, for the decryption key.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>89</t>
                                        </td>
                                        <td>
                                            <t>Malware.Spyware</t>
                                        </td>
                                        <td>
                                            <t>A type of software that secretly monitors and collects information about a user's activities, such as keystrokes, browsing habits, and personal data, without their consent.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>90</t>
                                        </td>
                                        <td>
                                            <t>Malware.Adware</t>
                                        </td>
                                        <td>
                                            <t>A type of software that automatically displays or downloads unwanted advertisements, often in a disruptive manner, and may track user behavior.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>91</t>
                                        </td>
                                        <td>
                                            <t>Malware.Rootkit</t>
                                        </td>
                                        <td>
                                            <t>A type of malware designed to hide its presence and grant an attacker persistent, privileged access to a compromised system while evading detection.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>92</t>
                                        </td>
                                        <td>
                                            <t>Malware.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident involving malicious software that does not fit into the specific malware subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>93</t>
                                        </td>
                                        <td>
                                            <t>Geophysical.Earthquake</t>
                                        </td>
                                        <td>
                                            <t>An incident caused by a sudden, rapid shaking of the earth resulting from the movement of tectonic plates, which can cause ground shaking, surface rupture, and tsunamis.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>94</t>
                                        </td>
                                        <td>
                                            <t>Geophysical.MassMovement</t>
                                        </td>
                                        <td>
                                            <t>An incident involving the downslope movement of rock, soil, or snow under the force of gravity, such as landslides, avalanches, or rockfalls.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>95</t>
                                        </td>
                                        <td>
                                            <t>Geophysical.Volcanic</t>
                                        </td>
                                        <td>
                                            <t>An incident caused by the eruption of magma and volcanic gases from a volcano, which can produce lava flows, pyroclastic flows, ashfall, and lahars.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>96</t>
                                        </td>
                                        <td>
                                            <t>Geophysical.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident caused by solid-earth processes not covered by specific geophysical subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>97</t>
                                        </td>
                                        <td>
                                            <t>Meteo.Heat</t>
                                        </td>
                                        <td>
                                            <t>A meteorological incident involving a prolonged period of excessively hot weather, which can cause health impacts, infrastructure stress, and environmental damage.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>98</t>
                                        </td>
                                        <td>
                                            <t>Meteo.Cold</t>
                                        </td>
                                        <td>
                                            <t>A meteorological incident involving a rapid fall in temperature over a short period, or a prolonged period of extreme cold, posing risks to health and infrastructure.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>99</t>
                                        </td>
                                        <td>
                                            <t>Meteo.Fog</t>
                                        </td>
                                        <td>
                                            <t>A meteorological incident where dense fog reduces visibility, potentially disrupting transportation and causing accidents.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>100</t>
                                        </td>
                                        <td>
                                            <t>Meteo.Rain</t>
                                        </td>
                                        <td>
                                            <t>A meteorological incident involving excessive or prolonged rainfall that can lead to flooding, landslides, and transportation disruptions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>101</t>
                                        </td>
                                        <td>
                                            <t>Meteo.Snow</t>
                                        </td>
                                        <td>
                                            <t>A meteorological incident involving heavy snowfall and blizzard conditions, which can disrupt transportation, damage infrastructure, and pose risks to safety.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>102</t>
                                        </td>
                                        <td>
                                            <t>Meteo.Wind</t>
                                        </td>
                                        <td>
                                            <t>A meteorological incident involving damaging or dangerous winds, such as from storms, tornadoes, or hurricanes, that can cause structural damage and power outages.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>104</t>
                                        </td>
                                        <td>
                                            <t>Meteo.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident caused by atmospheric processes not covered by specific meteorological subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>105</t>
                                        </td>
                                        <td>
                                            <t>Hydro.Flood</t>
                                        </td>
                                        <td>
                                            <t>An incident where water submerges land that is normally dry, often caused by heavy rain, storm surge, or dam failure, leading to property damage and risk to life.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>106</t>
                                        </td>
                                        <td>
                                            <t>Hydro.Landslide</t>
                                        </td>
                                        <td>
                                            <t>An incident involving the downward movement of slope materials (soil, rock) triggered by water saturation from heavy rain or snowmelt.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>107</t>
                                        </td>
                                        <td>
                                            <t>Hydro.Wave</t>
                                        </td>
                                        <td>
                                            <t>An incident involving destructive waves, such as tsunamis or storm surges, that can cause coastal flooding, erosion, and damage.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>108</t>
                                        </td>
                                        <td>
                                            <t>Hydro.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident caused by the movement, distribution, and quality of water, not covered by specific hydrological subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>109</t>
                                        </td>
                                        <td>
                                            <t>Climat.Drought</t>
                                        </td>
                                        <td>
                                            <t>A prolonged period of below-average precipitation leading to a water shortage, which can impact agriculture, ecosystems, and water supplies.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>110</t>
                                        </td>
                                        <td>
                                            <t>Climat.LakeOutburst</t>
                                        </td>
                                        <td>
                                            <t>An incident where a glacial lake dam (often moraine or ice) fails, rapidly releasing a large volume of water and causing devastating floods downstream.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>111</t>
                                        </td>
                                        <td>
                                            <t>Climat.Wildfire</t>
                                        </td>
                                        <td>
                                            <t>An unplanned and uncontrolled fire burning in natural or rural areas, often exacerbated by climatic conditions like drought, wind, and heat.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>112</t>
                                        </td>
                                        <td>
                                            <t>Climat.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident caused by long-lived atmospheric processes (climatological) not covered by specific subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>113</t>
                                        </td>
                                        <td>
                                            <t>Biological.Epidemic</t>
                                        </td>
                                        <td>
                                            <t>The rapid and widespread occurrence of an infectious disease in a specific population or region, exceeding what is normally expected.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>114</t>
                                        </td>
                                        <td>
                                            <t>Biological.Insect</t>
                                        </td>
                                        <td>
                                            <t>An incident involving a harmful outbreak or infestation of insects that threatens public health, agriculture, livestock, or property.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>115</t>
                                        </td>
                                        <td>
                                            <t>Biological.Animal</t>
                                        </td>
                                        <td>
                                            <t>An incident where animals pose a direct threat to human safety, public health (e.g., zoonotic diseases), or economic stability (e.g., livestock diseases).</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>116</t>
                                        </td>
                                        <td>
                                            <t>Biological.Zombies</t>
                                        </td>
                                        <td>
                                            <t>A fictional or hypothetical scenario involving a pathogen that causes a pandemic of aggressive, infectious behavior, often used as a metaphor for worst-case outbreak scenarios in planning.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>117</t>
                                        </td>
                                        <td>
                                            <t>Biological.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident caused bybiological not covered by specific subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>118</t>
                                        </td>
                                        <td>
                                            <t>Extraterrestrial.Impact</t>
                                        </td>
                                        <td>
                                            <t>An incident involving a celestial object (asteroid, meteoroid, comet) colliding with Earth, potentially causing localized or global damage.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>119</t>
                                        </td>
                                        <td>
                                            <t>Extraterrestrial.Aliens</t>
                                        </td>
                                        <td>
                                            <t>A hypothetical incident involving the discovery of or interaction with extraterrestrial intelligent life, a theoretical scenario in scientific and security planning.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>120</t>
                                        </td>
                                        <td>
                                            <t>Extraterrestrial.SpaceWeather</t>
                                        </td>
                                        <td>
                                            <t>An event caused by solar or cosmic activity, such as solar flares or geomagnetic storms, that can disrupt Earth's technological infrastructure.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>121</t>
                                        </td>
                                        <td>
                                            <t>Extraterrestrial.Other</t>
                                        </td>
                                        <td>
                                            <t>Any other incident caused extraterrestrial process not covered by specific subcategories.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>122</t>
                                        </td>
                                        <td>
                                            <t>Other.Uncategorised</t>
                                        </td>
                                        <td>
                                            <t>Any incident that does not fit into one of the predefined categories in this taxonomy.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>123</t>
                                        </td>
                                        <td>
                                            <t>Other.Undetermined</t>
                                        </td>
                                        <td>
                                            <t>An incident whose category is currently unknown, under investigation, or cannot be determined.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>124</t>
                                        </td>
                                        <td>
                                            <t>Other.Test</t>
                                        </td>
                                        <td>
                                            <t>An incident generated solely for the purpose of testing systems, processes, or training personnel.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>125</t>
                                        </td>
                                        <td>
                                            <t>Other.ext-value</t>
                                        </td>
                                        <td>
                                            <t>A value used to indicate that this attribute is extended and the actual value is provided using the corresponding ext-* attribute. (see <xref target="private-extension-enum"/>)</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>ext-Category</dt>
                    <dd>
                        <t>Optional.
                            A means by which to extend the Category attribute. (see <xref target="private-extension-enum"/>)</t>
                    </dd>
                
                    <dt>Cause</dt>
                    <dd>
                        <t>Optional.
                            Incident cause.
                            The cause can be modified by any analyzer on the way of the alert and later
                            by the operator and/or the analyst if new investigation reveals and confirms
                            a different cause of the event.</t>
                        <table anchor="enum-alert-cause"><name>Incident causes</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Normal</t>
                                        </td>
                                        <td>
                                            <t>The event is related to an expected phenomenon or to a
                                                phenomenon that does not qualify as out of the ordinary.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>Error</t>
                                        </td>
                                        <td>
                                            <t>The event is related to a human error.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Malicious</t>
                                        </td>
                                        <td>
                                            <t>The event is related to malicious code or malicious actions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Malfunction</t>
                                        </td>
                                        <td>
                                            <t>The event is related to a device or service malfunction.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>Hazard</t>
                                        </td>
                                        <td>
                                            <t>The event is related to a hazard phenomenon.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>5</t>
                                        </td>
                                        <td>
                                            <t>Unknown</t>
                                        </td>
                                        <td>
                                            <t>The cause of the event is unknown.</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>Description</dt>
                    <dd>
                        <t>Optional.
                            Short free text human-readable description of the event.
                            The description can add detail to the event category for easiest/faster comprehension by the operator.
                            Example :
                            * Cryptoware WannaCry blocked on pegasus server
                            * Unknown person entering through east doorway</t>
                    </dd>
                
                    <dt>Status</dt>
                    <dd>
                        <t>Optional.
                            Event state in the overall event lifecycle.</t>
                        <table anchor="enum-alert-status"><name>Incident statuses</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Event</t>
                                        </td>
                                        <td>
                                            <t>The event is still considered as an harmless event and should not be treated.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>Incident</t>
                                        </td>
                                        <td>
                                            <t>The event is considered as an incident and should be taken care of.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Open</t>
                                        </td>
                                        <td>
                                            <t>The incident is confirmed and actively being investigated.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Closed</t>
                                        </td>
                                        <td>
                                            <t>Investigation is finished and the issue is handled.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>FalsePositive</t>
                                        </td>
                                        <td>
                                            <t>Investigation is finished, incident was a false positive.</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>Priority</dt>
                    <dd>
                        <t>Optional.
                            Priority of the alert.
                            Priority is defined by conbining impact and urgency. It indicates how fast the incident should be taken care of.</t>
                        <table anchor="enum-alert-priority"><name>Incident priorities</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Unknown</t>
                                        </td>
                                        <td>
                                            <t>Priority unknow</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>Info</t>
                                        </td>
                                        <td>
                                            <t>No priority, the alert is informational</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Low</t>
                                        </td>
                                        <td>
                                            <t>Low priority</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Medium</t>
                                        </td>
                                        <td>
                                            <t>Medium priority</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>High</t>
                                        </td>
                                        <td>
                                            <t>High priority</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>Confidence</dt>
                    <dd>
                        <t>Optional.
                            A floating-point value between 0 and 1 indicating the analyzer's confidence
                            in its own reliability of this particular detection, where 0 means
                            that the detection is surely incorrect while 1 means there is no doubt
                            about the detection made.</t>
                    </dd>
                
                    <dt>Note</dt>
                    <dd>
                        <t>Optional.
                            Free text human-readable additional note, possibly a longer description
                            of the incident if is not already obvious.</t>
                        <t>The Note attribute can be used to store any additional information. It can be additional information about the event and/or about the incident resolution, although the incident resolution information should in principle be stored elsewhere (with a link with the external tool in AltNames)</t>
                    </dd>
                
                    <dt>CreateTime</dt>
                    <dd>
                        <t>Mandatory.
                            Timestamp indicating when the alert was created.</t>
                    </dd>
                
                    <dt>StartTime</dt>
                    <dd>
                        <t>Optional.
                            Timestamp indicating the deduced start of the event.</t>
                        <t>StartTime can be later than CreateTime in case or Alerts created from forecast information (e.g. Snow Storm expected in two days staring at 10h00)</t>
                    </dd>
                
                    <dt>EndTime</dt>
                    <dd>
                        <t>Optional.
                            Timestamp indicating the deduced end of the event.</t>
                    </dd>
                
                    <dt>AltNames</dt>
                    <dd>
                        <t>Optional.
                            Alternative identifiers; strings which help pair the event to internal
                            systems' information (for example ticket IDs inside a request tracking
                            systems).</t>
                    </dd>
                
                    <dt>AltCategory</dt>
                    <dd>
                        <t>Optional.
                            Alternate categories from a reference other than IDMEFv2 categories
                            (e.g. MISP, MITRE ATT@CK or another proprietary/internal reference).</t>
                    </dd>
                
                    <dt>Ref</dt>
                    <dd>
                        <t>Optional.
                            References to sources of information related to the incident and/or
                            vulnerability, and specific to this incident.</t>
                        <t>This MAY be a URL to additional info, or a URN in a registered or
                            unregistered ad-hoc namespace bearing reasonable information value
                            and uniqueness, such as "urn:cve:CVE-2013-2266".</t>
                    </dd>
                
                    <dt>CorrelID</dt>
                    <dd>
                        <t>Optional.
                            Identifiers for the  messages which were used as information sources
                            to create this message, in case the message has been created based on
                            correlation/analysis/deduction from other messages.</t>
                    </dd>
                
                    <dt>AggrCondition</dt>
                    <dd>
                        <t>Optional.
                            A list of IDMEF fields used to aggregate events. The values for these
                            fields will be the same in all aggregated events.</t>
                        <t>This attribute should mostly be set by intermediary nodes, which detect
                            duplicates, or aggregate events, spanning multiple detection windows,
                            into a longer one.</t>
                        <t>The "StartTime" and "EndTime" attributes are used in conjunction
                            with this attribute to describe the aggregation window.</t>
                    </dd>
                
                    <dt>PredID</dt>
                    <dd>
                        <t>Optional.
                            A list containing the identifiers of previous messages
                            which are obsoleted by this message.</t>
                        <t>The obsoleted alerts SHOULD NOT be used anymore.
                            This field can be used to "update" an alert.</t>
                    </dd>
                
                    <dt>RelID</dt>
                    <dd>
                        <t>Optional.
                            A list containing the identifiers of other messages related
                            to this message.</t>
                    </dd>
                </dl>
      </section>
      <section anchor="class_analyzer">
        <name>The Analyzer Class</name>
        <t>The Analyzer class describes the module that has analyzed the data
                captured by the sensors, identified an event of interest and decided
                to create an alert.</t>
        <figure anchor="class_analyzer_diagram">
          <name>The Analyzer class</name>
          <artwork type="ascii-art" align="center">+-----------------------+
|       Analyzer        |
+-----------------------+
| UUID     ID           |
| IP       IP           |
| STRING   Name         |
| STRING   Hostname     |
| STRING   Model        |
| ENUM[]   Category     |
| STRING[] ext-Category |
| ENUM[]   Data         |
| STRING[] ext-Data     |
| ENUM[]   Method       |
| STRING[] ext-Method   |
| GEOLOC   GeoLocation  |
| UNLOCODE UnLocation   |
| STRING   Location     |
+-----------------------+</artwork>
        </figure>
        <t>The Analyzer class has the following attributes:</t>
        <dl newline="true">
                    <dt>ID</dt>
                    <dd>
                        <t>Mandatory.
                            Unique identifier for the analyzer.</t>
                    </dd>
                
                    <dt>IP</dt>
                    <dd>
                        <t>Optional. Analyzer IP address.</t>
                    </dd>
                
                    <dt>Name</dt>
                    <dd>
                        <t>Mandatory. Name of the analyzer, which must be reasonably unique, however still bear some meaningful sense.</t>
                        <t>This attribute usually denotes the hierarchy of organizational units
                            the detector belongs to and its own name.
                            It MAY also be used to distinguish multiple analyzers running with
                            the same IP address.</t>
                    </dd>
                
                    <dt>Hostname</dt>
                    <dd>
                        <t>Optional. Hostname of this analyzer.</t>
                        <t>SHOULD be a fully-qualified domain name.</t>
                    </dd>
                
                    <dt>Model</dt>
                    <dd>
                        <t>Optional. Analyzer model description (usually its generic name,
                            brand and version).</t>
                    </dd>
                
                    <dt>Category</dt>
                    <dd>
                        <t>Optional. Analyzer categories.</t>
                        <table anchor="enum-analyzer-category"><name>Analyzer Categories</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Undetermined</t>
                                        </td>
                                        <td>
                                            <t>Analyzer category is undetermined</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>APP.BAST</t>
                                        </td>
                                        <td>
                                            <t>Bastion Host - Secure remote access gateway</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>APP.DAST</t>
                                        </td>
                                        <td>
                                            <t>Dynamic Application Security Testing - Runtime application testing</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>APP.IAST</t>
                                        </td>
                                        <td>
                                            <t>Interactive Application Security Testing - Hybrid application testing</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>APP.RASP</t>
                                        </td>
                                        <td>
                                            <t>Runtime Application Self-Protection - Self-protecting applications</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>5</t>
                                        </td>
                                        <td>
                                            <t>APP.SAST</t>
                                        </td>
                                        <td>
                                            <t>Static Application Security Testing - Source code analysis</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>6</t>
                                        </td>
                                        <td>
                                            <t>CLD.CASB</t>
                                        </td>
                                        <td>
                                            <t>Cloud Access Security Broker - Cloud service security mediation</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>7</t>
                                        </td>
                                        <td>
                                            <t>CLD.CIEM</t>
                                        </td>
                                        <td>
                                            <t>Cloud Infrastructure Entitlement Management - Cloud permission management</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>8</t>
                                        </td>
                                        <td>
                                            <t>CLD.CSPM</t>
                                        </td>
                                        <td>
                                            <t>Cloud Security Posture Management - Cloud configuration monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>9</t>
                                        </td>
                                        <td>
                                            <t>CLD.CWPP</t>
                                        </td>
                                        <td>
                                            <t>Cloud Workload Protection Platform - Cloud workload security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>10</t>
                                        </td>
                                        <td>
                                            <t>DDoS.ANTI-DDOS</t>
                                        </td>
                                        <td>
                                            <t>Distributed Denial of Service Protection - DDoS mitigation system</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>11</t>
                                        </td>
                                        <td>
                                            <t>DDoS.SCRUB</t>
                                        </td>
                                        <td>
                                            <t>Scrubber/Scrubbing Center - Traffic cleaning for DDoS</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>12</t>
                                        </td>
                                        <td>
                                            <t>DDoS.WAF-DDOS</t>
                                        </td>
                                        <td>
                                            <t>Web Application Firewall with DDoS - Integrated DDoS protection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>13</t>
                                        </td>
                                        <td>
                                            <t>EMAIL.ANTI-PHISH</t>
                                        </td>
                                        <td>
                                            <t>Anti-Phishing - Phishing attempt detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>14</t>
                                        </td>
                                        <td>
                                            <t>EMAIL.DMARC</t>
                                        </td>
                                        <td>
                                            <t>Domain-based Message Authentication - Email authentication monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>15</t>
                                        </td>
                                        <td>
                                            <t>EMAIL.SEG</t>
                                        </td>
                                        <td>
                                            <t>Secure Email Gateway - Comprehensive email security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>16</t>
                                        </td>
                                        <td>
                                            <t>EMAIL.SPAM-FILTER</t>
                                        </td>
                                        <td>
                                            <t>Spam Filter - Unsolicited email detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>17</t>
                                        </td>
                                        <td>
                                            <t>END.AM</t>
                                        </td>
                                        <td>
                                            <t>Application Allowlisting - Application execution control</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>18</t>
                                        </td>
                                        <td>
                                            <t>END.AV</t>
                                        </td>
                                        <td>
                                            <t>Antivirus - Signature-based malware detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>19</t>
                                        </td>
                                        <td>
                                            <t>END.DLP-EP</t>
                                        </td>
                                        <td>
                                            <t>Endpoint Data Loss Prevention - Endpoint data leakage prevention</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>20</t>
                                        </td>
                                        <td>
                                            <t>END.EDR</t>
                                        </td>
                                        <td>
                                            <t>Endpoint Detection and Response - Advanced endpoint threat hunting</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>21</t>
                                        </td>
                                        <td>
                                            <t>END.EPP</t>
                                        </td>
                                        <td>
                                            <t>Endpoint Protection Platform - Comprehensive endpoint security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>22</t>
                                        </td>
                                        <td>
                                            <t>END.HIDS</t>
                                        </td>
                                        <td>
                                            <t>Host Intrusion Detection System - Host-based threat monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>23</t>
                                        </td>
                                        <td>
                                            <t>END.HIPS</t>
                                        </td>
                                        <td>
                                            <t>Host Intrusion Prevention System - Host-based threat prevention</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>24</t>
                                        </td>
                                        <td>
                                            <t>END.HPT</t>
                                        </td>
                                        <td>
                                            <t>Honeypot - Deception-based threat detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>25</t>
                                        </td>
                                        <td>
                                            <t>END.RASP</t>
                                        </td>
                                        <td>
                                            <t>Runtime Application Self-Protection - In-app runtime protection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>26</t>
                                        </td>
                                        <td>
                                            <t>ID.DCAP</t>
                                        </td>
                                        <td>
                                            <t>Data-Centric Audit and Protection - Data-centric security monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>27</t>
                                        </td>
                                        <td>
                                            <t>ID.DLP</t>
                                        </td>
                                        <td>
                                            <t>Data Loss Prevention - Data leakage prevention across channels</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>28</t>
                                        </td>
                                        <td>
                                            <t>ID.IAM</t>
                                        </td>
                                        <td>
                                            <t>Identity and Access Management - Identity governance and access control</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>29</t>
                                        </td>
                                        <td>
                                            <t>ID.IRM</t>
                                        </td>
                                        <td>
                                            <t>Identity Risk Management - Identity-based risk analysis</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>30</t>
                                        </td>
                                        <td>
                                            <t>ID.PAM</t>
                                        </td>
                                        <td>
                                            <t>Privileged Access Management - Privileged access management</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>31</t>
                                        </td>
                                        <td>
                                            <t>ID.PIM</t>
                                        </td>
                                        <td>
                                            <t>Privileged Identity Management - Privileged account security</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>32</t>
                                        </td>
                                        <td>
                                            <t>ID.UEBA</t>
                                        </td>
                                        <td>
                                            <t>User and Entity Behavior Analytics - Behavioral threat detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>33</t>
                                        </td>
                                        <td>
                                            <t>NET.DNS-FW</t>
                                        </td>
                                        <td>
                                            <t>DNS Firewall - Malicious domain filtering</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>34</t>
                                        </td>
                                        <td>
                                            <t>NET.DPI</t>
                                        </td>
                                        <td>
                                            <t>Deep Packet Inspection - Advanced packet analysis</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>35</t>
                                        </td>
                                        <td>
                                            <t>NET.FW</t>
                                        </td>
                                        <td>
                                            <t>Firewall - Network traffic filtering and policy enforcement</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>36</t>
                                        </td>
                                        <td>
                                            <t>NET.NAC</t>
                                        </td>
                                        <td>
                                            <t>Network Access Control - Endpoint compliance and access enforcement</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>37</t>
                                        </td>
                                        <td>
                                            <t>NET.NBAD</t>
                                        </td>
                                        <td>
                                            <t>Network Behavior Anomaly Detection - Anomaly detection in network behavior</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>38</t>
                                        </td>
                                        <td>
                                            <t>NET.NDR</t>
                                        </td>
                                        <td>
                                            <t>Network Detection and Response - Advanced network threat hunting</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>39</t>
                                        </td>
                                        <td>
                                            <t>NET.NGFW</t>
                                        </td>
                                        <td>
                                            <t>Next-Generation Firewall - Advanced firewall with app awareness</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>40</t>
                                        </td>
                                        <td>
                                            <t>NET.NIDS</t>
                                        </td>
                                        <td>
                                            <t>Network Intrusion Detection System - Network traffic analysis for threats</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>41</t>
                                        </td>
                                        <td>
                                            <t>NET.NIPS</t>
                                        </td>
                                        <td>
                                            <t>Network Intrusion Prevention System - Inline threat prevention</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>42</t>
                                        </td>
                                        <td>
                                            <t>NET.PROXY</t>
                                        </td>
                                        <td>
                                            <t>Proxy Server - ACL and TLS session monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>43</t>
                                        </td>
                                        <td>
                                            <t>NET.WAF</t>
                                        </td>
                                        <td>
                                            <t>Web Application Firewall - HTTP/HTTPS traffic filtering</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>44</t>
                                        </td>
                                        <td>
                                            <t>NET.WIDS</t>
                                        </td>
                                        <td>
                                            <t>Wireless Intrusion Detection System - WiFi threat detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>45</t>
                                        </td>
                                        <td>
                                            <t>NET.WIPS</t>
                                        </td>
                                        <td>
                                            <t>Wireless Intrusion Prevention System - WiFi threat prevention</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>46</t>
                                        </td>
                                        <td>
                                            <t>OT.IoT-IDS</t>
                                        </td>
                                        <td>
                                            <t>IoT Intrusion Detection System - IoT device threat detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>47</t>
                                        </td>
                                        <td>
                                            <t>OT.OT-IDS</t>
                                        </td>
                                        <td>
                                            <t>Operational Technology IDS - Industrial control system monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>48</t>
                                        </td>
                                        <td>
                                            <t>OT.PLC-SCAN</t>
                                        </td>
                                        <td>
                                            <t>PLC Scanner - PLC/SCADA vulnerability detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>49</t>
                                        </td>
                                        <td>
                                            <t>PHY.1D-LAS</t>
                                        </td>
                                        <td>
                                            <t>1D Laser Sensor - Basic laser presence/distance detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>50</t>
                                        </td>
                                        <td>
                                            <t>PHY.1D-LiDAR</t>
                                        </td>
                                        <td>
                                            <t>1D Light Detection and Ranging Sensor - Single-beam laser for distance measurement</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>51</t>
                                        </td>
                                        <td>
                                            <t>PHY.2D-LAS</t>
                                        </td>
                                        <td>
                                            <t>2D Laser Sensor - Planar laser scanning</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>52</t>
                                        </td>
                                        <td>
                                            <t>PHY.2D-LiDAR</t>
                                        </td>
                                        <td>
                                            <t>2D Light Detection and Ranging Sensor - Planar laser scanning for 2D mapping</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>53</t>
                                        </td>
                                        <td>
                                            <t>PHY.3D-LAS</t>
                                        </td>
                                        <td>
                                            <t>3D Laser Sensor - 3D laser scanning</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>54</t>
                                        </td>
                                        <td>
                                            <t>PHY.3D-LiDAR</t>
                                        </td>
                                        <td>
                                            <t>3D Light Detection and Ranging Sensor - 3D environmental scanning and mapping</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>55</t>
                                        </td>
                                        <td>
                                            <t>PHY.ACCESS-CTRL</t>
                                        </td>
                                        <td>
                                            <t>Access Control System - Physical entry/exit control monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>56</t>
                                        </td>
                                        <td>
                                            <t>PHY.ADS</t>
                                        </td>
                                        <td>
                                            <t>Anti-Drone System - Drone detection and countermeasure system</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>57</t>
                                        </td>
                                        <td>
                                            <t>PHY.FR-CAM</t>
                                        </td>
                                        <td>
                                            <t>Face Recognition Camera - Biometric facial recognition system</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>58</t>
                                        </td>
                                        <td>
                                            <t>PHY.GLASS-BRK</t>
                                        </td>
                                        <td>
                                            <t>Glass Break Detector - Acoustic glass breakage detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>59</t>
                                        </td>
                                        <td>
                                            <t>PHY.HAR</t>
                                        </td>
                                        <td>
                                            <t>Human Activity Recognition - AI-based human behavior and motion analysis</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>60</t>
                                        </td>
                                        <td>
                                            <t>PHY.LWIR</t>
                                        </td>
                                        <td>
                                            <t>Long-Wave Infrared - Long-wave thermal imaging</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>61</t>
                                        </td>
                                        <td>
                                            <t>PHY.MOT-SEN</t>
                                        </td>
                                        <td>
                                            <t>Motion Sensor - PIR/microwave motion detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>62</t>
                                        </td>
                                        <td>
                                            <t>PHY.MWIR</t>
                                        </td>
                                        <td>
                                            <t>Mid-Wave Infrared - Mid-wave thermal imaging</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>63</t>
                                        </td>
                                        <td>
                                            <t>PHY.OBJ-DET</t>
                                        </td>
                                        <td>
                                            <t>Object Detection Camera - General object detection and classification</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>64</t>
                                        </td>
                                        <td>
                                            <t>PHY.SWIR</t>
                                        </td>
                                        <td>
                                            <t>Short-Wave Infrared - Short-wave infrared imaging</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>65</t>
                                        </td>
                                        <td>
                                            <t>PHY.VAD</t>
                                        </td>
                                        <td>
                                            <t>Voice Activity Detection - Audio analysis for voice/speech detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>66</t>
                                        </td>
                                        <td>
                                            <t>PHY.VNIR</t>
                                        </td>
                                        <td>
                                            <t>Visible and Near-Infrared - Multi-spectral imaging sensor</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>67</t>
                                        </td>
                                        <td>
                                            <t>SIEM.ETL</t>
                                        </td>
                                        <td>
                                            <t>Extract, Transform, Load - Data pipeline tools (Logstash, Fluentd, Vector)</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>68</t>
                                        </td>
                                        <td>
                                            <t>SIEM.LOG</t>
                                        </td>
                                        <td>
                                            <t>Log Analyzer - Log aggregation and analysis (e.g., ELK Stack, Splunk)</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>69</t>
                                        </td>
                                        <td>
                                            <t>SIEM.NMS</t>
                                        </td>
                                        <td>
                                            <t>Network Management System - Network monitoring and management</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>70</t>
                                        </td>
                                        <td>
                                            <t>SIEM.SIEM</t>
                                        </td>
                                        <td>
                                            <t>Security Information and Event Management - Centralized security logging and alerting</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>71</t>
                                        </td>
                                        <td>
                                            <t>SIEM.SOAR</t>
                                        </td>
                                        <td>
                                            <t>Security Orchestration and Response - Automated incident response</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>72</t>
                                        </td>
                                        <td>
                                            <t>TI.CTI</t>
                                        </td>
                                        <td>
                                            <t>Cyber Threat Intelligence - Strategic threat intelligence</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>73</t>
                                        </td>
                                        <td>
                                            <t>TI.TI-FEED</t>
                                        </td>
                                        <td>
                                            <t>Threat Intelligence Feed - External threat data streams</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>74</t>
                                        </td>
                                        <td>
                                            <t>TI.TIP</t>
                                        </td>
                                        <td>
                                            <t>Threat Intelligence Platform - Threat data aggregation and analysis</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>75</t>
                                        </td>
                                        <td>
                                            <t>VM.ASM</t>
                                        </td>
                                        <td>
                                            <t>Attack Surface Management - External attack surface monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>76</t>
                                        </td>
                                        <td>
                                            <t>VM.PENTEST</t>
                                        </td>
                                        <td>
                                            <t>Penetration Testing Tools - Manual/automated security testing</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>77</t>
                                        </td>
                                        <td>
                                            <t>VM.VULN-SCANNER</t>
                                        </td>
                                        <td>
                                            <t>Vulnerability Scanner - Automated vulnerability assessment</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>78</t>
                                        </td>
                                        <td>
                                            <t>VM.ASM</t>
                                        </td>
                                        <td>
                                            <t>Attack Surface Management - External attack surface monitoring</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>79</t>
                                        </td>
                                        <td>
                                            <t>ext-value</t>
                                        </td>
                                        <td>
                                            <t>A value used to indicate that this attribute is extended and the actual value is provided using the corresponding ext-* attribute. (see <xref target="private-extension-enum"/>)</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>ext-Category</dt>
                    <dd>
                        <t>Optional.
                            A means by which to extend the Category attribute.  (see <xref target="private-extension-enum"/>)</t>
                    </dd>
                
                    <dt>Data</dt>
                    <dd>
                        <t>Optional. Type of data analyzed during the detection.</t>
                        <table anchor="enum-analyzer-data"><name>Analyzer Data</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Undetermined</t>
                                        </td>
                                        <td>
                                            <t>Analyzer data is undetermed.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>Light</t>
                                        </td>
                                        <td>
                                            <t>ambient light levels, flicker detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Acoustics</t>
                                        </td>
                                        <td>
                                            <t>sound pressure, specific frequencies</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Contact</t>
                                        </td>
                                        <td>
                                            <t>physical interaction, switch state</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>Vibration</t>
                                        </td>
                                        <td>
                                            <t>mechanical oscillation, structural health</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>5</t>
                                        </td>
                                        <td>
                                            <t>Temperature</t>
                                        </td>
                                        <td>
                                            <t>ambient, device, or surface</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>6</t>
                                        </td>
                                        <td>
                                            <t>Humidity</t>
                                        </td>
                                        <td>
                                            <t>relative humidity, moisture in air</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>7</t>
                                        </td>
                                        <td>
                                            <t>Rain</t>
                                        </td>
                                        <td>
                                            <t>precipitation detection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>8</t>
                                        </td>
                                        <td>
                                            <t>Water</t>
                                        </td>
                                        <td>
                                            <t>leak detection, immersion, water flow</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>9</t>
                                        </td>
                                        <td>
                                            <t>Fog</t>
                                        </td>
                                        <td>
                                            <t>visibility reduction, optical density</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>10</t>
                                        </td>
                                        <td>
                                            <t>Particles</t>
                                        </td>
                                        <td>
                                            <t>dust, smoke, airborne contaminants</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>11</t>
                                        </td>
                                        <td>
                                            <t>Seismic</t>
                                        </td>
                                        <td>
                                            <t>ground motion, earthquakes, vibrations</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>12</t>
                                        </td>
                                        <td>
                                            <t>Magnetic</t>
                                        </td>
                                        <td>
                                            <t>magnetic anomaly detection, proximity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>13</t>
                                        </td>
                                        <td>
                                            <t>Images</t>
                                        </td>
                                        <td>
                                            <t>visible spectrum cameras</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>14</t>
                                        </td>
                                        <td>
                                            <t>Thermal</t>
                                        </td>
                                        <td>
                                            <t>infrared imaging, heat signatures</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>15</t>
                                        </td>
                                        <td>
                                            <t>Lidar</t>
                                        </td>
                                        <td>
                                            <t>laser-based distance measurement, 3D mapping</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>16</t>
                                        </td>
                                        <td>
                                            <t>Network</t>
                                        </td>
                                        <td>
                                            <t>traffic, bandwidth, connectivity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>17</t>
                                        </td>
                                        <td>
                                            <t>Flow</t>
                                        </td>
                                        <td>
                                            <t>netflow, packet flow analysis</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>18</t>
                                        </td>
                                        <td>
                                            <t>Protocol</t>
                                        </td>
                                        <td>
                                            <t>protocol anomalies, compliance</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>19</t>
                                        </td>
                                        <td>
                                            <t>Datagram</t>
                                        </td>
                                        <td>
                                            <t>packet-level inspection</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>20</t>
                                        </td>
                                        <td>
                                            <t>Host</t>
                                        </td>
                                        <td>
                                            <t>server or device health, uptime</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>21</t>
                                        </td>
                                        <td>
                                            <t>Connection</t>
                                        </td>
                                        <td>
                                            <t>session establishment, drops</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>22</t>
                                        </td>
                                        <td>
                                            <t>Port</t>
                                        </td>
                                        <td>
                                            <t>open/closed, scanning activity</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>23</t>
                                        </td>
                                        <td>
                                            <t>SNMP</t>
                                        </td>
                                        <td>
                                            <t>simple network management protocol data</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>24</t>
                                        </td>
                                        <td>
                                            <t>Authentication</t>
                                        </td>
                                        <td>
                                            <t>login attempts, failures, anomalies</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>25</t>
                                        </td>
                                        <td>
                                            <t>Log</t>
                                        </td>
                                        <td>
                                            <t>system, application, security logs</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>26</t>
                                        </td>
                                        <td>
                                            <t>File</t>
                                        </td>
                                        <td>
                                            <t>file integrity, access, changes</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>27</t>
                                        </td>
                                        <td>
                                            <t>Content</t>
                                        </td>
                                        <td>
                                            <t>payload inspection, data content</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>28</t>
                                        </td>
                                        <td>
                                            <t>Data</t>
                                        </td>
                                        <td>
                                            <t>generic data streams, sensor data</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>29</t>
                                        </td>
                                        <td>
                                            <t>Reporting</t>
                                        </td>
                                        <td>
                                            <t>summary reports, alerts from other systems</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>30</t>
                                        </td>
                                        <td>
                                            <t>Alert</t>
                                        </td>
                                        <td>
                                            <t>triggered notifications</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>31</t>
                                        </td>
                                        <td>
                                            <t>Relay</t>
                                        </td>
                                        <td>
                                            <t>alert forwarding, escalation</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>32</t>
                                        </td>
                                        <td>
                                            <t>External</t>
                                        </td>
                                        <td>
                                            <t>third-party alerts, threat intelligence feeds</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>33</t>
                                        </td>
                                        <td>
                                            <t>ext-value</t>
                                        </td>
                                        <td>
                                            <t>A value used to indicate that this attribute is extended and the actual value is provided using the corresponding ext-* attribute. (see <xref target="private-extension-enum"/>)</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>ext-Data</dt>
                    <dd>
                        <t>Optional.
                            A means by which to extend the Data attribute.  (see <xref target="private-extension-enum"/>)</t>
                    </dd>
                
                    <dt>Method</dt>
                    <dd>
                        <t>Optional. Detection method.</t>
                        <table anchor="enum-analyzer-method"><name>Analyzer Methods</name>
                            
                            <thead>
                                    <tr>
                                        <th>
                                            <t>Rank</t>
                                        </th>
                                        <th>
                                            <t>Keyword</t>
                                        </th>
                                        <th>
                                            <t>Description</t>
                                        </th>
                                    </tr>
                                </thead><tbody>
                                    <tr>
                                        <td>
                                            <t>0</t>
                                        </td>
                                        <td>
                                            <t>Undetermined</t>
                                        </td>
                                        <td>
                                            <t>Analyzer method is undetermed</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>1</t>
                                        </td>
                                        <td>
                                            <t>AI</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that uses machine learning, deep learning, or other artificial intelligence techniques to learn normal behavior and detect sophisticated or novel threats.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>2</t>
                                        </td>
                                        <td>
                                            <t>Anomaly</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that identifies deviations from established norms or baselines without relying on predefined signatures, often flagging unusual patterns in traffic, behavior, or system activity.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>3</t>
                                        </td>
                                        <td>
                                            <t>Behavioral</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that monitors and analyzes the actions of users, entities, or processes over time to detect malicious or suspicious activities that deviate from expected behavior patterns.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>4</t>
                                        </td>
                                        <td>
                                            <t>Biometric</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that uses electronic devices to capture and measure unique physical or behavioral characteristics (e.g., fingerprint, iris, voice) for identification or authentication purposes.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>5</t>
                                        </td>
                                        <td>
                                            <t>Blackhole</t>
                                        </td>
                                        <td>
                                            <t>A method that analyses traffic destined for a non-existent or sinkhole route to identify malicious activity, such as connections to known command-and-control servers or scanning from infected hosts.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>6</t>
                                        </td>
                                        <td>
                                            <t>Contextual</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that enriches raw events with additional context (e.g., asset value, user role, time of day, business criticality) to prioritize alerts and assess true impact.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>7</t>
                                        </td>
                                        <td>
                                            <t>Correlation</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that aggregates and examines multiple, disparate data streams or events to identify complex relationships, patterns, sequences, or dependencies that indicate a security incident.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>8</t>
                                        </td>
                                        <td>
                                            <t>Ensemble</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that combines multiple detection methods (e.g., signature, anomaly, behavioral) to improve accuracy, reduce false positives, and detect threats that single methods might miss.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>9</t>
                                        </td>
                                        <td>
                                            <t>Fingerprinting</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that creates unique identifiers or "fingerprints" for devices, applications, or network stacks to detect spoofing, unauthorized devices, or configuration changes.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>10</t>
                                        </td>
                                        <td>
                                            <t>Frequency</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that detects incidents based on the rate or regularity of events (e.g., repeated failed logins, rapid-fire requests) exceeding or falling below expected frequencies.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>11</t>
                                        </td>
                                        <td>
                                            <t>Fusion</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that combines data from multiple heterogeneous sensors and sources to create a comprehensive, high-confidence view of an incident, reducing ambiguity and false alerts.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>12</t>
                                        </td>
                                        <td>
                                            <t>Geolocation</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that determines the physical location of an asset or event (e.g., login attempt, IP address, device) and flags activities occurring from unexpected or high-risk locations.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>13</t>
                                        </td>
                                        <td>
                                            <t>Graph-based</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that models relationships between entities (users, devices, processes) as graphs and detects anomalies or attack paths by analyzing connections, dependencies, and traversals.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>14</t>
                                        </td>
                                        <td>
                                            <t>Heat</t>
                                        </td>
                                        <td>
                                            <t>An analyzer (sensor or device) that detects, measures, and monitors thermal energy (infrared radiation) to identify anomalies like fires, overheating equipment, or human presence.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>15</t>
                                        </td>
                                        <td>
                                            <t>Heuristic</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that detects potentially unknown threats by using algorithmic logic, rules of thumb, or suspicious characteristics rather than relying on specific signature matches.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>16</t>
                                        </td>
                                        <td>
                                            <t>Honeypot</t>
                                        </td>
                                        <td>
                                            <t>A decoy system or resource designed to lure, detect, and analyze malicious activity by mimicking a legitimate target, diverting attackers away from real assets.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>17</t>
                                        </td>
                                        <td>
                                            <t>Hygiene</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that continuously checks systems and configurations against security best practices, compliance standards, or hardening guidelines to identify weaknesses or drift.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>18</t>
                                        </td>
                                        <td>
                                            <t>Integrity</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that monitors critical system components (files, configurations, registry keys) for unauthorized changes, verifying their integrity against a known good baseline.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>19</t>
                                        </td>
                                        <td>
                                            <t>Metadata</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that examines the data about data (e.g., file creation timestamps, email headers, connection logs) to uncover hidden relationships or suspicious attributes.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>20</t>
                                        </td>
                                        <td>
                                            <t>Monitor</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that continuously observes a system, network, or environment to track its state, health, or activity, often providing real-time alerts on specific conditions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>21</t>
                                        </td>
                                        <td>
                                            <t>Movement</t>
                                        </td>
                                        <td>
                                            <t>An analyzer (sensor or system) that detects, tracks, and quantifies physical motion using technologies like radar, lidar, or video analytics.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>22</t>
                                        </td>
                                        <td>
                                            <t>Orchestration</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that coordinates and triggers automated response actions based on detected incidents, often integrated with SOAR (Security Orchestration, Automation, and Response) platforms.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>23</t>
                                        </td>
                                        <td>
                                            <t>Pattern</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that identifies specific sequences, combinations, or recurring arrangements of events or data that indicate malicious activity, even if individual elements appear benign.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>24</t>
                                        </td>
                                        <td>
                                            <t>Policy</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that evaluates events, configurations, or behaviors against a set of predefined rules, configurations, or compliance requirements to detect violations or misconfigurations.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>25</t>
                                        </td>
                                        <td>
                                            <t>Predictive</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that uses historical data and modeling to forecast potential future incidents, vulnerabilities, or attack vectors before they occur.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>26</t>
                                        </td>
                                        <td>
                                            <t>Protocol</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that validates network traffic or communications against expected protocol specifications, RFC compliance, or standard behavior to detect anomalies or malicious variations.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>27</t>
                                        </td>
                                        <td>
                                            <t>Recon</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that actively or passively probes or monitors an environment to discover assets, services, or vulnerabilities, often as part of a defensive assessment or adversary simulation.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>28</t>
                                        </td>
                                        <td>
                                            <t>Reputation</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that evaluates the trustworthiness of an entity (e.g., IP address, domain, file hash) by checking it against known threat intelligence lists, blocklists, or reputation scores.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>29</t>
                                        </td>
                                        <td>
                                            <t>Rule-based</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that applies conditional logic (if-then-else statements) defined by experts to correlate events and generate alerts based on specific combinations of conditions.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>30</t>
                                        </td>
                                        <td>
                                            <t>Sequence</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that detects threats by examining the order and timing of events, identifying attack chains or kill chain progressions (e.g., scan → exploit → installation → C2).</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>31</t>
                                        </td>
                                        <td>
                                            <t>Signature</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that detects known threats by matching events or patterns against a database of specific signatures, hashes, or Indicators of Compromise (IoCs).</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>32</t>
                                        </td>
                                        <td>
                                            <t>Statistical</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that detects anomalies by establishing a baseline of normal behavior and identifying events that deviate significantly from expected statistical parameters.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>33</t>
                                        </td>
                                        <td>
                                            <t>Tarpit</t>
                                        </td>
                                        <td>
                                            <t>A mechanism that intentionally slows down or delays suspicious connections (e.g., network connections or login attempts) to hinder automated attacks and scanning.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>34</t>
                                        </td>
                                        <td>
                                            <t>Threat Intelligence</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that ingests and matches internal events against external threat feeds, IoC lists, and adversary TTPs (Tactics, Techniques, and Procedures) to identify known threats.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>35</t>
                                        </td>
                                        <td>
                                            <t>Threshold</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that detects incidents by comparing a metric or count (e.g., number of failed logins, traffic volume) against a predefined limit or threshold.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>36</t>
                                        </td>
                                        <td>
                                            <t>Trend</t>
                                        </td>
                                        <td>
                                            <t>An analyzer that monitors data over extended periods to identify gradual changes, emerging patterns, or long-term shifts that may indicate evolving threats or security degradation.</t>
                                        </td>
                                    </tr>
                                    <tr>
                                        <td>
                                            <t>37</t>
                                        </td>
                                        <td>
                                            <t>ext-value</t>
                                        </td>
                                        <td>
                                            <t>A value used to indicate that this attribute is extended and the actual value is provided using the corresponding ext-* attribute. (see <xref target="private-extension-enum"/>)</t>
                                        </td>
                                    </tr>
                                </tbody>
                        </table>
                    </dd>
                
                    <dt>ext-Method</dt>
                    <dd>
                        <t>Optional.
                            A means by which to extend the Method attribute.  (see <xref target="private-extension-enum"/>)</t>
                    </dd>
                
                    <dt>GeoLocation</dt>
                    <dd>
                        <t>Optional. GPS coordinates for the analyzer.</t>
                    </dd>
                
                    <dt>UnLocation</dt>
                    <dd>
                        <t>Optional. Standard UN/Locode for the analyzer.</t>
                    </dd>
                
                    <dt>Location</dt>
                    <dd>
                        <t>Optional. Internal name for the location of the analyzer.</t>
                    </dd>
                </dl>
      </section>
      <section anchor="class_sensor">
        <name>The Sensor Class</name>
        <t>The Sensor class describes the module that captured the data before sending
                it to an analyzer. The Sensor may be a subpart of the Analyzer.</t>
        <figure anchor="class_sensor_diagram">
          <name>The Sensor class</name>
          <artwork type="ascii-art" align="center">+----------------------+
|        Sensor        |
+----------------------+
| UUID     ID          |
| IP       IP          |
| STRING   Name        |
| STRING   Hostname    |
| STRING   Model       |
| GEOLOC   GeoLocation |
| UNLOCODE UnLocation  |
| STRING   Location    |
| STRING   CaptureZone |
+----------------------+</artwork>
        </figure>
        <t>The Sensor class has the following attributes:</t>
        <dl newline="true">
                    <dt>ID</dt>
                    <dd>
                        <t>Mandatory.
                            Unique identifier for the sensor.</t>
                    </dd>
                
                    <dt>IP</dt>
                    <dd>
                        <t>Optional. The sensor's IP address.</t>
                    </dd>
                
                    <dt>Name</dt>
                    <dd>
                        <t>Mandatory. Name of the sensor, which must be reasonably unique,
                            however still bear some meaningful sense.</t>
                        <t>This attribute usually denotes the hierarchy of organizational units
                            the sensor belongs to and its own name.
                            It MAY also be used to distinguish multiple sensors running with
                            the same IP address.</t>
                    </dd>
                
                    <dt>Hostname</dt>
                    <dd>
                        <t>Optional. The sensor's hostname.</t>
                        <t>This SHOULD be a fully qualified domain name, but may not conform
                            exactly because values extracted from logs, messages, DNS, etc.
                            may themselves be malformed.</t>
                        <t>An empty string MAY be used to explicitly state that this value
                            was inquired but not found (missing DNS entry).</t>
                    </dd>
                
                    <dt>Model</dt>
                    <dd>
                        <t>Optional. The sensor model's description (usually its generic name,
                            brand and version).</t>
                    </dd>
                
                    <dt>GeoLocation</dt>
                    <dd>
                        <t>Optional. GPS coordinates for the analyzer.</t>
                    </dd>
                
                    <dt>UnLocation</dt>
                    <dd>
                        <t>Optional. Standard UN/Locode for the sensor.</t>
                    </dd>
                
                    <dt>Location</dt>
                    <dd>
                        <t>Optional. Internal name for the location of the sensor.</t>
                    </dd>
                
                    <dt>CaptureZone</dt>
                    <dd>
                        <t>Optional. A string that describes the "capture zone" of the sensor,
                            as a JSON-serialized string.</t>
                        <t>Depending on the type of sensor, the capture zone may for instance
                            refer to:</t>
                        <ul>
                            <li>
                                <t>A JSON object describing a camera's settings (elevation, horizontal
                                    and vertical field of view, azimuth, etc.)</t>
                            </li>
                            <li>
                                <t>A description of the IP network where packet capture is taking place.</t>
                            </li>
                        </ul>
                    </dd>
                </dl>
      </section>
      <section anchor="class_source">
        <name>The Source Class</name>
        <t>The Source class describes the origin(s) of the event(s) leading up to the creation of this alert.</t>
        <figure anchor="class_source_diagram">
          <name>The Source class</name>
          <artwork type="ascii-art" align="center">+------------------------+
|         Source         |
+------------------------+
| UUID       ID          |
| IP         IP          |
| STRING     Hostname    |
| STRING     Note        |
| STRING[]   TI          |
| STRING     User        |
| EMAIL      Email       |
| PROTOCOL[] Protocol    |
| INT[]      Port        |
| GEOLOC     GeoLocation |
| UNLOCODE   UnLocation  |
| STRING     Location    |
| ID[]       Attachment  |
+------------------------+</artwork>
        </figure>
        <t>The Source class has the following attributes:</t>
        <dl newline="true">
                    <dt>ID</dt>
                    <dd>
                        <t>Mandatory.
                            Unique identifier for the source.</t>
                    </dd>
                
                    <dt>IP</dt>
                    <dd>
                        <t>Optional. Source IP address.</t>
                    </dd>
                
                    <dt>Hostname</dt>
                    <dd>
                        <t>Optional. Hostname of this source.</t>
                        <t>This SHOULD be a fully qualified domain name, but may not conform
                            exactly because values extracted from logs, messages, DNS, etc.
                            may themselves be malformed.</t>
                        <t>An empty string MAY be used to explicitly state that this value
                            was inquired but not found (missing DNS entry).</t>
                    </dd>
                
                    <dt>Note</dt>
                    <dd>
                        <t>Optional. Free text human-readable additional note for this source.</t>
                    </dd>
                
                    <dt>TI</dt>
                    <dd>
                        <t>Optional. Threat Intelligence data about the source.</t>
                        <t>Values in this list MUST use the format "attribute:origin",
                            where "attribute" refers to the attribute inside this source
                            found inside a Threat Intelligence database, and "origin"
                            contains a short identifier for the Threat Intelligence database.
                            E.g. "IP:Dshield".</t>
                        <t>Please note that the same attribute may appear multiple times
                            inside the list (because a match was found in multiple
                            Threat Intelligence databases).</t>
                    </dd>
                
                    <dt>User</dt>
                    <dd>
                        <t>Optional. User ID or login responsible for the incident.</t>
                    </dd>
                
                    <dt>Email</dt>
                    <dd>
                        <t>Optional. Email address responsible for the incident.</t>
                        <t>E.g. the value of the "Reply-To" or "From" header inside
                            a phishing e-mail.</t>
                    </dd>
                
                    <dt>Protocol</dt>
                    <dd>
                        <t>Optional. Protocols related to connections from/to this source.</t>
                        <t>If several protocols are stacked, they MUST be ordered from
                            the lowest (the closest to the medium) to the highest (the closest
                            to the application) according to the ISO/OSI model.</t>
                    </dd>
                
                    <dt>Port</dt>
                    <dd>
                        <t>Optional. Source ports involved in the incident.</t>
                        <t>Values in this list MUST be integers and MUST be in the range 1-65535.</t>
                    </dd>
                
                    <dt>GeoLocation</dt>
                    <dd>
                        <t>Optional. GPS coordinates for the source.</t>
                    </dd>
                
                    <dt>UnLocation</dt>
                    <dd>
                        <t>Optional. Standard UN/Locode for the source.</t>
                    </dd>
                
                    <dt>Location</dt>
                    <dd>
                        <t>Optional. Internal name for the location of the source.</t>
                    </dd>
                
                    <dt>Attachment</dt>
                    <dd>
                        <t>Optional. Identifiers for attachments related to this source.</t>
                        <t>Each identifier listed here MUST match the "Name" attribute for one
                            of the attachments described using the <xref target="class_attachment">Attachment class</xref>.</t>
                    </dd>
                </dl>
      </section>
      <section anchor="class_target">
        <name>The Target Class</name>
        <t>The Target class describes the target(s) impacted by the event(s) leading up to the creation of this alert.</t>
        <figure anchor="class_target_diagram">
          <name>The Target class</name>
          <artwork type="ascii-art" align="center">+------------------------+
|         Target         |
+------------------------+
| UUID       ID          |
| IP         IP          |
| STRING     Hostname    |
| STRING     Note        |
| STRING     Service     |
| STRING     User        |
| EMAIL      Email       |
| INT[]      Port        |
| GEOLOC     GeoLocation |
| UNLOCODE   UnLocation  |
| STRING     Location    |
| ID[]       Attachment  |
+------------------------+</artwork>
        </figure>
        <t>The Target class has the following attributes:</t>
        <dl newline="true">
                    <dt>ID</dt>
                    <dd>
                        <t>Mandatory.
                            Unique identifier for the target.</t>
                    </dd>
                
                    <dt>IP</dt>
                    <dd>
                        <t>Optional. Target IP address.</t>
                    </dd>
                
                    <dt>Hostname</dt>
                    <dd>
                        <t>Optional. Hostname of this target.</t>
                        <t>This SHOULD be a fully qualified domain name, but may not conform
                            exactly because values extracted from logs, messages, DNS, etc.
                            may themselves be malformed.</t>
                        <t>An empty string MAY be used to explicitly state that this value
                            was inquired but not found (missing DNS entry).</t>
                    </dd>
                
                    <dt>Note</dt>
                    <dd>
                        <t>Optional. Free text human-readable additional note for this target.</t>
                    </dd>
                
                    <dt>Service</dt>
                    <dd>
                        <t>Optional. Service or process impacted by the incident.</t>
                    </dd>
                
                    <dt>User</dt>
                    <dd>
                        <t>Optional. User ID or login impacted by the incident.</t>
                    </dd>
                
                    <dt>Email</dt>
                    <dd>
                        <t>Optional. Email address impacted by the incident.</t>
                        <t>E.g. the value of the "To" header inside a phishing e-mail.</t>
                    </dd>
                
                    <dt>Port</dt>
                    <dd>
                        <t>Optional. Target ports involved in the incident.</t>
                        <t>Values in this list MUST be integers and MUST be in the range 1-65535.</t>
                    </dd>
                
                    <dt>GeoLocation</dt>
                    <dd>
                        <t>Optional. GPS coordinates for the target.</t>
                    </dd>
                
                    <dt>UnLocation</dt>
                    <dd>
                        <t>Optional. Standard UN/Locode for the target.</t>
                    </dd>
                
                    <dt>Location</dt>
                    <dd>
                        <t>Optional. Internal name for the location of the target.</t>
                    </dd>
                
                    <dt>Attachment</dt>
                    <dd>
                        <t>Optional. Identifiers for attachments related to this target.</t>
                        <t>Each identifier listed here MUST match the "Name" attribute for one
                            of the attachments described using the <xref target="class_attachment">Attachment class</xref>.</t>
                    </dd>
                </dl>
      </section>
      <section anchor="class_attachment">
        <name>The Attachment Class</name>
        <t>The Attachment class contains additional data which was captured
                in relation with the event.</t>
        <figure anchor="class_attachment_diagram">
          <name>The Attachment class</name>
          <artwork type="ascii-art" align="center">+----------------------------+
|         Attachment         |
+----------------------------+
| ID         Name            |
| STRING     FileName        |
| HASH[]     Hash            |
| INT        Size            |
| URI[]      Ref             |
| URI[]      ExternalURI     |
| STRING     Note            |
| MEDIATYPE  ContentType     |
| STRING     ContentEncoding |
| STRING     Content         |
+----------------------------+</artwork>
        </figure>
        <t>The Attachment class has the following attributes:</t>
        <dl newline="true">
                    <dt>Name</dt>
                    <dd>
                        <t>Mandatory. A unique identifier among attachments that can be used
                            to reference this attachment from other classes using the
                            "Attachment" attribute.</t>
                    </dd>
                
                    <dt>FileName</dt>
                    <dd>
                        <t>Optional. Attachment filename.</t>
                        <t>This will usually be the original name of the captured file
                            or the name of the file containing the captured content
                            (e.g. a packet capture file).</t>
                    </dd>
                
                    <dt>Hash</dt>
                    <dd>
                        <t>Optional. A list of hash results for the attachment's Content.</t>
                        <t>The values in this list are computed by taking the raw value
                            of the attachment's "Content" attribute.
                            The hash result is computed before any other transformation
                            (e.g. Base64 encoding) is applied to the content, so that a
                            receiving IDMEF system may reverse the transformation, apply
                            the same hashing function and obtain the same hash result.
                            See also the definition for the "ContentEncoding" attribute below.</t>
                        <t>It is RECOMMENDED that compatible implementations use one of
                            the hashing functions from the SHA-2 <xref target="RFC6234"/> or
                            SHA-3 <xref target="NIST.FIPS.202"/> families to compute the hash
                            results in this list.</t>
                    </dd>
                
                    <dt>Size</dt>
                    <dd>
                        <t>Optional. Length of the content (in bytes).</t>
                        <t>This value MUST be a non-negative integer.</t>
                    </dd>
                
                    <dt>Ref</dt>
                    <dd>
                        <t>Optional.
                            References to sources of information related to the incident and/or
                            vulnerability, and specific to this attachment.</t>
                    </dd>
                
                    <dt>ExternalURI</dt>
                    <dd>
                        <t>Optional. If the attachment's content is available and/or recognizable
                            from an external resource, this is the URI (usually a URL) to that resource.</t>
                        <t>This MAY also be a URN in a registered or unregistered ad-hoc namespace
                            bearing reasonable information value and uniqueness, such as
                            "urn:mhr:55eaf7effadc07f866d1eaed9c64e7ee49fe081a" or
                            "magnet:?xt=urn:sha1:YNCKHTQCWBTRNJIV4WNAE52SJUQCZO5C".</t>
                    </dd>
                
                    <dt>Note</dt>
                    <dd>
                        <t>Optional. Free text human-readable additional note for this attachment.</t>
                    </dd>
                
                    <dt>ContentType</dt>
                    <dd>
                        <t>Optional. Internet Media Type of the attachment.</t>
                        <t>For compatibility reasons, implementations SHOULD prefer one of the
                            well-known media types registered in IANA .</t>
                    </dd>
                
                    <dt>ContentEncoding</dt>
                    <dd>
                        <t>Optional. Content encoding.</t>
                        <t>The following encodings are defined in this version of the specification:</t>
                        <ul>
                            <li>
                                <t>"json": The content refers to a JSON object which has been serialized
                                    to a string using the serialization procedure defined in <xref target="RFC8259"/>.</t>
                            </li>
                            <li>
                                <t>"base64": The content has been serialized using the Base64 encoding
                                    defined in <xref target="RFC4648"/>.</t>
                            </li>
                        </ul>
                        <t>The "base64" encoding SHOULD be used when the content contains binary data.
                            If omitted, the "json" encoding MUST be assumed.</t>
                    </dd>
                
                    <dt>Content</dt>
                    <dd>
                        <t>Optional. The attachment's content, in case it is directly embedded
                            inside the message.</t>
                        <t>For large attachments, it is RECOMMENDED that implementations make use
                            of the "ExternalURI" attribute to refererence a copy of the content saved
                            in an external storage mechanism.</t>
                    </dd>
                </dl>
      </section>
      <section anchor="json-sm">
        <name>The JavaScript Object Notation Serialization Method</name>
        <t>This serialization method aims to convert IDMEFv2 messages to a
                format that is easy to parse and process, both by software/hardware
                processors, as well as humans. It relies on the the JavaScript
                Object Notation (JSON) Data Interchange Format defined in [RFC8259].</t>
        <t>Conforming implementations MUST implement all the requirements
                specified in [RFC8259].</t>
        <t>In addition, the following rules MUST be observed when serializing an
                IDMEFv2 message:</t>
        <ul>
                <li>
                    <t>The top-level Alert class (Section 4.2) is represented as a JSON
                        object ([RFC8259]). This JSON object is returned to the calling
                        process at the end of the serialization process.</t>
                </li>
                <li>
                    <t>Aggregate classes are represented as JSON objects and stored as
                        members of the top-level JSON object, using the same name as in
                        the IDMEF data model. E.g. the appears under the name "Analyzer"
                        inside the top-level JSON object.</t>
                </li>
                <li>
                    <t>Attributes are stored as members of the JSON object representing
                        the class they belong to, using the same name as in the IDMEF data
                        model. E.g. the "Version" attribute from the is stored under the
                        name "Version" inside the top-level JSON object.</t>
                </li>
                <li>
                    <t>Lists from the IDMEF data model are represented as JSON arrays
                        ([RFC8259]). This also applies to aggregate classes where a list
                        is expected. E.g. the "Sensor" member inside the top-level JSON
                        object contains a list of objects, where each object represents an
                        instance of the .</t>
                </li>
                <li>
                    <t>The various string-based data types listed in Section 3 are
                        represented as JSON strings ([RFC8259]). Please note that the
                        issues outlined in [RFC8259] regarding strings processing also
                        apply here.</t>
                </li>
                <li>
                    <t>IDMEF attributes with the "NUMBER" data type are represented as
                        JSON numbers ([RFC8259]).</t>
                </li>
            </ul>
      </section>
    </section>
    <section>
      <name>Security Considerations</name>
      <t>This document describes a data representation for exchanging security-related
            information between incident detection system implementations.  Although there
            are no security concerns directly applicable to the format of this data, the
            data itself may contain security-sensitive information whose confidentiality,
            integrity, and/or availability may need to be protected.</t>
      <t>This suggests that the systems used to collect, transmit, process, and store
            this data should be protected against unauthorized use and that the data itself
            should be protected against unauthorized access.</t>
      <t>The underlying messaging format and protocol used to exchange instances of the
            IDMEF MUST provide appropriate guarantees of confidentiality, integrity, and
            authenticity. The use of a standardized security protocol is encouraged.</t>
      <t>The draft-lehmann-idmefv2-https-transport-01.txt document defines the transportation of IDMEF over HTTPs that provides such
            security.</t>
    </section>
    <section>
      <name>IANA Considerations</name>
      <t>This document creates 10 identically structured registries to be
            managed by IANA:</t>
      <ul>
            <li>
                <t>Name of the registry group: "Incident Detection Message Exchange Format v2 (IDMEF)"</t>
            </li>
            <li>
                <t>URL of the registry: http://www.iana.org/assignments/idmefv2</t>
            </li>
            <li>
                <t>Namespace format: A registry entry consists of:</t>
                <ul>
                    <li>
                        <t>Rank. A uniq integer for this namespace. Range starts at 0 and ends at the
                            length of this list. The maximum length of this list is 255.</t>
                    </li>
                    <li>
                        <t>Keyword. A keyword for a given IDMEF attribute. It MUST conform
                            to the formatting specified by the IDMEF "ENUM" data type
                            (<xref target="data-types-enums"/>).</t>
                    </li>
                    <li>
                        <t>Description. A short description of the enumerated keyword.</t>
                    </li>
                    <li>
                        <t>Reference. An optional list of URIs to further describe the value.</t>
                    </li>
                </ul>
            </li>
            <li>
                <t>Allocation policy: Expert Review per <xref target="RFC8126"/>.
                    This reviewer will ensure that the requested registry entry conforms
                    to the prescribed formatting. The reviewer will also ensure that the
                    entry is an appropriate value for the attribute per the information
                    model (<xref target="model"/>).</t>
            </li>
        </ul>
      <t>The registries to be created are named in the "Registry Name" column
            of <xref target="iana-registries"/>. Each registry is initially populated
            with ranks, keywords and descriptions that come from an attribute specified
            in the IDMEF model (<xref target="model"/>).
            The initial Ranks, Keywords and Description fields of a given
            registry are listed in "Initial Values".
            The "Initial Values" column points to a table in this document that
            lists and describes each enumerated keyword. Each enumerated keyword
            in the table gets a corresponding entry in a given registry.
            The initial value of the Reference field of every registry entry
            described below should be this document.</t>
      <table anchor="iana-registries"><name>IANA Enumerated Value Registries</name>
            
            <thead>
                    <tr>
                        <th>
                            <t>Registry Name</t>
                        </th>
                        <th>
                            <t>Initial Values</t>
                        </th>
                    </tr>
                </thead><tbody>
                    <tr>
                        <td>
                            <t>Alert-Type</t>
                        </td>
                        <td>
                            <t><xref target="enum-alert-type"/> (<xref target="class_alert">Alert class</xref>)</t>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <t>Alert-Category</t>
                        </td>
                        <td>
                            <t><xref target="enum-alert-category"/> (<xref target="class_alert">Alert class</xref>)</t>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <t>Alert-Cause</t>
                        </td>
                        <td>
                            <t><xref target="enum-alert-cause"/> (<xref target="class_alert">Alert class</xref>)</t>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <t>Alert-Priority</t>
                        </td>
                        <td>
                            <t><xref target="enum-alert-priority"/> (<xref target="class_alert">Alert class</xref>)</t>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <t>Alert-Status</t>
                        </td>
                        <td>
                            <t><xref target="enum-alert-status"/> (<xref target="class_alert">Alert class</xref>)</t>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <t>Analyzer-Category</t>
                        </td>
                        <td>
                            <t><xref target="enum-analyzer-category"/> (<xref target="class_alert">Alert class</xref>)</t>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <t>Analyzer-Data</t>
                        </td>
                        <td>
                            <t><xref target="enum-analyzer-data"/> (<xref target="class_analyzer">Analyzer class</xref>)</t>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <t>Analyzer-Method</t>
                        </td>
                        <td>
                            <t><xref target="enum-analyzer-method"/> (<xref target="class_analyzer">Analyzer class</xref>)</t>
                        </td>
                    </tr>
                </tbody>
        </table>
    </section>
    <section>
      <name>Acknowledgement</name>
      <t>The following groups and individuals contributed to the creation of this document and should be recognized for their efforts.</t>
      <ul>
            <li>
                <t>The former Prelude SIEM team :
                    Thomas Andrejak &amp; François Poirotte (Co-authors of the first version of this document),
                    Antoine Luong, Song Tran, Selim Menouar and Camille Gardet</t>
            </li>
            <li>
                <t>The core members of the SECEF (SECurity Exchange Format) consortium :
                    Herve Debar (Author of RFC 4765 - IDMEFv1), Guillaume Hiet and François Dechelle</t>
            </li>
            <li>
                <t>The H2020 7SHIELD project (Safety and Security Standards of Space Systems, ground Segments
                    and Satellite data assets , via prevention, detection, response and mitigation of physical
                    and cyber threats) who implemented in real scale first versions of IDMEFv2 on five pilots
                    around Europe helping greatly to improve it.</t>
            </li>
            <li>
                <t>The CESNET team for their work on the [IDEA0] format (based on IDMEFv1) which inspired
                    multiples concepts to IDMEFv2.</t>
            </li>
            <li>
                <t>The [ENISA-RIST] Reference Security Incident Taxonomy Working Group</t>
            </li>
        </ul>
    </section>
  </middle>
  <back>
    <references title="Normative References">
      <reference anchor="RFC5321" target="https://www.rfc-editor.org/info/rfc5321">
  <front>
    <title>Simple Mail Transfer Protocol</title>
    <author fullname="J. Klensin" initials="J." surname="Klensin"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5321"/>
  <seriesInfo name="DOI" value="10.17487/RFC5321"/>
</reference>
      <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
  <front>
    <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
    <author fullname="N. Freed" initials="N." surname="Freed"/>
    <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
    <date month="November" year="1996"/>
    <abstract>
      <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2046"/>
  <seriesInfo name="DOI" value="10.17487/RFC2046"/>
</reference>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
      <reference anchor="RFC5322" target="https://www.rfc-editor.org/info/rfc5322">
  <front>
    <title>Internet Message Format</title>
    <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
    <date month="October" year="2008"/>
    <abstract>
      <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5322"/>
  <seriesInfo name="DOI" value="10.17487/RFC5322"/>
</reference>
      <reference anchor="RFC3339" target="https://www.rfc-editor.org/info/rfc3339">
  <front>
    <title>Date and Time on the Internet: Timestamps</title>
    <author fullname="G. Klyne" initials="G." surname="Klyne"/>
    <author fullname="C. Newman" initials="C." surname="Newman"/>
    <date month="July" year="2002"/>
    <abstract>
      <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3339"/>
  <seriesInfo name="DOI" value="10.17487/RFC3339"/>
</reference>
      <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>
      <reference anchor="RFC4122" target="https://www.rfc-editor.org/info/rfc4122">
  <front>
    <title>A Universally Unique IDentifier (UUID) URN Namespace</title>
    <author fullname="P. Leach" initials="P." surname="Leach"/>
    <author fullname="M. Mealling" initials="M." surname="Mealling"/>
    <author fullname="R. Salz" initials="R." surname="Salz"/>
    <date month="July" year="2005"/>
    <abstract>
      <t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t>
      <t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group). Information from earlier versions of the DCE specification have been incorporated into this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4122"/>
  <seriesInfo name="DOI" value="10.17487/RFC4122"/>
</reference>
      <reference anchor="RFC4291" target="https://www.rfc-editor.org/info/rfc4291">
  <front>
    <title>IP Version 6 Addressing Architecture</title>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <date month="February" year="2006"/>
    <abstract>
      <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
      <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4291"/>
  <seriesInfo name="DOI" value="10.17487/RFC4291"/>
</reference>
      <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648">
  <front>
    <title>The Base16, Base32, and Base64 Data Encodings</title>
    <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
    <date month="October" year="2006"/>
    <abstract>
      <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4648"/>
  <seriesInfo name="DOI" value="10.17487/RFC4648"/>
</reference>
      <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
  <front>
    <title>Augmented BNF for Syntax Specifications: ABNF</title>
    <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
    <author fullname="P. Overell" initials="P." surname="Overell"/>
    <date month="January" year="2008"/>
    <abstract>
      <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="68"/>
  <seriesInfo name="RFC" value="5234"/>
  <seriesInfo name="DOI" value="10.17487/RFC5234"/>
</reference>
      <reference anchor="RFC5952" target="https://www.rfc-editor.org/info/rfc5952">
  <front>
    <title>A Recommendation for IPv6 Address Text Representation</title>
    <author fullname="S. Kawamura" initials="S." surname="Kawamura"/>
    <author fullname="M. Kawashima" initials="M." surname="Kawashima"/>
    <date month="August" year="2010"/>
    <abstract>
      <t>As IPv6 deployment increases, there will be a dramatic increase in the need to use IPv6 addresses in text. While the IPv6 address architecture in Section 2.2 of RFC 4291 describes a flexible model for text representation of an IPv6 address, this flexibility has been causing problems for operators, system engineers, and users. This document defines a canonical textual representation format. It does not define a format for internal storage, such as within an application or database. It is expected that the canonical format will be followed by humans and systems when representing IPv6 addresses as text, but all implementations must accept and be able to handle any legitimate RFC 4291 format. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5952"/>
  <seriesInfo name="DOI" value="10.17487/RFC5952"/>
</reference>
      <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
  <front>
    <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
    <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
      <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="90"/>
  <seriesInfo name="RFC" value="8259"/>
  <seriesInfo name="DOI" value="10.17487/RFC8259"/>
</reference>
      <reference target="https://www.unicode.org/versions/Unicode14.0.0/" anchor="UNICODE">
        <front>
          <title>Unicode Standard</title>
          <author>
            <organization>Unicode Consortium</organization>
          </author>
          <date day="14" month="September" year="2021"/>
        </front>
        <seriesInfo name="version" value="14.0.0"/>
      </reference>
      <reference target="https://github.com/enisaeu/Reference-Security-Incident-Taxonomy-Task-Force/blob/master/working_copy/humanv1.md" anchor="ENISA-RIST">
        <front>
          <title>Reference Incident Classification Taxonomy</title>
          <author>
            <organization abbrev="ENISA">European Union Agency for Cybersecurity</organization>
          </author>
          <date day="26" month="January" year="2018"/>
        </front>
      </reference>
      <reference anchor="IANA_media_types" target="http://www.iana.org/assignments/media-types">
  <front>
    <title>Media Types</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
      <reference anchor="IANA_hash_function_text_names" target="http://www.iana.org/assignments/hash-function-text-names">
  <front>
    <title>Hash Function Textual Names</title>
    <author>
      <organization>IANA</organization>
    </author>
  </front>
</reference>
      <reference target="https://unece.org/trade/cefact/unlocode-code-list-country-and-territory" anchor="UN-LOCODE">
        <front>
          <title abbrev="UN/LOCODE">UN/LOCODE Code List by Country and Territory</title>
          <author>
            <organization abbrev="UNECE">United Nations Economic Commission for Europe</organization>
          </author>
          <date day="6" month="July" year="2021"/>
        </front>
      </reference>
    </references>
    <references title="Informative References">
      <reference anchor="RFC4765" target="https://www.rfc-editor.org/info/rfc4765">
  <front>
    <title>The Intrusion Detection Message Exchange Format (IDMEF)</title>
    <author fullname="H. Debar" initials="H." surname="Debar"/>
    <author fullname="D. Curry" initials="D." surname="Curry"/>
    <author fullname="B. Feinstein" initials="B." surname="Feinstein"/>
    <date month="March" year="2007"/>
    <abstract>
      <t>The purpose of the Intrusion Detection Message Exchange Format (IDMEF) is to define data formats and exchange procedures for sharing information of interest to intrusion detection and response systems and to the management systems that may need to interact with them.</t>
      <t>This document describes a data model to represent information exported by intrusion detection systems and explains the rationale for using this model. An implementation of the data model in the Extensible Markup Language (XML) is presented, an XML Document Type Definition is developed, and examples are provided. This memo defines an Experimental Protocol for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4765"/>
  <seriesInfo name="DOI" value="10.17487/RFC4765"/>
</reference>
      <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>
      <reference anchor="RFC6234" target="https://www.rfc-editor.org/info/rfc6234">
  <front>
    <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="T. Hansen" initials="T." surname="Hansen"/>
    <date month="May" year="2011"/>
    <abstract>
      <t>Federal Information Processing Standard, FIPS</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6234"/>
  <seriesInfo name="DOI" value="10.17487/RFC6234"/>
</reference>
      <reference anchor="NIST.FIPS.202" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf">
<front>
<title>SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions</title>
<author initials="Morris J." surname="Dworkin" fullname="Morris J. Dworkin">
<organization>Information Technology Laboratory</organization>
</author>
<date year="2015" month="July"/>
</front>
<seriesInfo name="NIST" value="NIST FIPS 202"/>
<seriesInfo name="DOI" value="10.6028/NIST.FIPS.202"/>
</reference>
      <reference target="https://apps.dtic.mil/sti/pdfs/ADA280358.pdf" anchor="WGS84">
        <front>
          <title>Department of Defense World Geodetic System 1984: Its Definition and Relationships with Local Geodetic Systems</title>
          <author>
            <organization>National Imagery and Mapping Agency</organization>
          </author>
          <date year="1984"/>
        </front>
        <seriesInfo name="Third" value="Edition"/>
      </reference>
      <reference target="https://idea.cesnet.cz/en/definition" anchor="IDEA0">
        <front>
          <title>Intrusion Detection Extensible Alert version 0</title>
          <author>
            <organization>CESNET</organization>
          </author>
          <date day="25" month="September" year="2015"/>
        </front>
      </reference>
    </references>
    <section>
      <name>Examples</name>
      <t>This section contains several examples of events/incidents which may be
            described using the IDMEF Data Model defined in.</t>
      <t>For each example, the serialization method listed in Section 5 was used on the
            original IDMEF message to produce a JSON representation.</t>
      <section>
        <name>Physical intrusion</name>
        <t>Listing 1 describes an incident where an unidentified man was detected on
                company premises near the building where server room A is located.</t>
        <sourcecode type="none">{
  "Version": "2.D.V07",
  "ID": "819df7bc-35ef-40d8-bbee-1901117370b1",
  "Description": "Potential intruder detected",
  "Type": "Physical",
  "Priority": "Low",
  "Status": "Incident",
  "Cause": "Malicious",
  "CreateTime": "2021-05-10T16:52:13.075994+00:00",
  "StartTime": "2021-05-10T16:52:13+00:00",
  "Category": [
    "Access.Forced"
  ],
  "Analyzer": {
    "Name": "BigBrother",
    "Hostname": "bb.acme.com",
    "Model": "Big Brother v42",
    "Category": [
      "PHY.HAR",
      "FRC.FR-CAM"
    ],
    "Data": [
      "Images"
    ],
    "Method": [
      "Movement",
      "Biometric",
      "AI"
    ],
    "IP": "192.0.2.1"
  },
  "Sensor": [
    {
      "IP": "192.0.2.2",
      "Name": "Camera #23",
      "Model": "SuperDuper Camera v1",
      "Location": "Hallway to server room A1"
    }
  ],
  "Source": [
    {
      "Note": "Black Organization, aka. APT 4869"
    }
  ],
  "Attachment": [
    {
      "Name": "wanted",
      "FileName": "fbi-wanted-poster.jpg",
      "Size": 1234567,
      "Ref": ["https://www.fbi.gov/wanted/topten"],
      "ContentType": "image/jpg",
      "ContentEncoding": "base64",
      "Content": "..."
    },
    {
      "Name": "pic01",
      "Note": "Hi-res picture showing John Doe near server room A1",
      "ExternalURI": ["ftps://192.0.2.1/cam23/20210510165211.jpg"],
      "ContentType": "image/jpg"
    }
  ]
}</sourcecode>
      </section>
      <section>
        <name>Cyberattack</name>
        <t>Listing 2 describes an incident related to a potential bruteforce attack
                against the "root" user account of the server at 192.0.2.2 and 2001:db8::/32.</t>
        <sourcecode type="none">{
  "Version": "2.D.V07",
  "ID": "819df7bc-35ef-40d8-bbee-1901117370b2",
  "Description": "Potential bruteforce attack on root user account",
  "Type": "Cyber",
  "Priority": "Medium",
  "CreateTime": "2021-05-10T16:55:29.196408+00:00",
  "StartTime": "2021-05-10T16:55:29+00:00",
  "Category": [
    "Access.Forced"
  ],
  "Analyzer": {
    "Name": "SIEM",
    "Hostname": "siem.acme.com",
    "Model": "Concerto SIEM 5.2",
    "Category": [
      "SIEM.SIEM",
      "SIEM.LOG"
    ],
    "Data": [
      "Log"
    ],
    "Method": [
      "Monitor",
      "Signature"
    ],
    "IP": "192.0.2.1"
  },
  "Sensor": [
    {
      "IP": "192.0.2.5",
      "Name": "syslog",
      "Hostname": "www.acme.com",
      "Model": "rsyslog 8.2110",
      "Location": "Server room A1, rack 10"
    }
  ],
  "Target": [
    {
      "IP": "192.0.2.2",
      "Hostname": "www.acme.com",
      "Location": "Server room A1, rack 10",
      "User": "root"
    },
    {
      "IP": "2001:db8::/32",
      "Hostname": "www.acme.com",
      "Location": "Server room A1, rack 10",
      "User": "root"
    }
  ]
}</sourcecode>
      </section>
      <section>
        <name>Server outage</name>
        <t>Listing 3 describes an incident where the webserver at "www.example.com"
                encountered some kind of failure condition resulting in an outage.</t>
        <sourcecode type="none">{
  "Version": "2.D.V07",
  "ID": "819df7bc-35ef-40d8-bbee-1901117370b3",
  "Description": "A server did not reply to an ICMP ping request",
  "Type": "Availability",
  "Priority": "Medium",
  "Status": "Incident",
  "Cause": "Unknown",
  "CreateTime": "2021-05-10T16:59:11.875209+00:00",
  "StartTime": "2021-05-10T16:59:11.875209+00:00",
  "Category": [
    "Availability.Outage"
  ],
  "Analyzer": {
    "Name": "NMS",
    "Hostname": "nms.example.com",
    "Model": "Concerto NMS 5.2",
    "Category": [
      "SIEM.NMS"
    ],
    "Data": [
      "Network"
    ],
    "Method": [
      "Monitor"
    ],
    "IP": "192.0.2.1"
  },
  "Target": [
    {
      "IP": "192.168.1.2",
      "Hostname": "www.acme.com",
      "Service": "website",
      "Location": "Server room A1, rack 10"
    }
  ]
}</sourcecode>
      </section>
      <section>
        <name>Combined incident</name>
        <t>Listing 4 describes a combined incident resulting from the correlation of the
                previous physical, cyber and availability incidents.</t>
        <sourcecode type="none">{
  "Version": "2.D.V07",
  "ID": "819df7bc-35ef-40d8-bbee-1901117370b4",
  "Description": "Intrusion and Sabotage detected",
  "Type": "Combined",
  "Priority": "High",
  "Status": "Incident",
  "Cause": "Malicious",
  "CreateTime": "2021-05-10T16:59:15.075994+00:00",
  "StartTime": "2021-05-10T16:52:11+00:00",
  "Category": [
    "Access.Unauthorized",
    "Sabotage.Data",
  ,
  "CorrelID": [
    "819df7bc-35ef-40d8-bbee-1901117370b1",
    "819df7bc-35ef-40d8-bbee-1901117370b2",
    "819df7bc-35ef-40d8-bbee-1901117370b3"
  ],
  "Analyzer": {
    "Name": "Correlator",
    "Hostname": "correlator.acme.com",
    "Model": "Concerto Hybrid Correlator v5.2",
    "Category": [
    ],
    "Data": [
      "Alert"
    ],
    "Method": [
      "Correlation"
    ],
    "IP": "192.0.2.1"
  },
  "Source": [
    {
      "Note": "Black Organization, aka. APT 4869"
    }
  ],
  "Target": [
    {
      "Location": "Server room A1"
    },
    {
      "IP": "192.0.2.2",
      "Hostname": "www.acme.com",
      "User": "root"
    },
    {
      "IP": "192.0.2.2",
      "Hostname": "www.acme.com",
      "Service": "website"
    }
  ]
}</sourcecode>
      </section>
      <section>
        <name>Hazard incident</name>
        <t>Listing 5 describes a heavy snow storm announced in 48h on Paris and Versailles.</t>
        <sourcecode type="none">{
  "Version": "2.D.V07",
  "ID": "819df7bc-35ef-40d8-bbee-1901117370b1",
  "Description": "Snow storm forecast",
  "Priority": "Low",
  "Status": "Incident",
  "Cause": "Hazard",
  "Confidence": 0.8,
  "CreateTime": "2021-05-10T16:52:13.075994+00:00",
  "StartTime": "2021-05-12T10:00:00+00:00",
  "EndTime": "2021-05-12T10:00:00+00:00",
  "Type": ["Physical"],
  "Category": [
    "Meteo.Snow",
    "Meteo.Wind",
    "Meteo.Cold"
  ],
  "Analyzer": {
    "Name": "Weather Monitor",
    "Hostname": "weather.acme.com",
    "IP": "192.0.2.1"
  },
  "Source": [
    {
      "Note": "Heavy snow storm coming from North"
    }
  ],
  "Target": [
    {
      "GeoLocation": "48.8584,2.2945",
      "UnLocation": "FR PAR",
      "Location": "Acme Paris Site"
    },
    {
      "GeoLocation": "48.8019,2.1301",
      "UnLocation": "FR VER",
      "Location": "Acme Versailles Site"
    }
  ]
}</sourcecode>
      </section>
    </section>
    <section>
      <name>JSON Validation Schema (Non-normative)</name>
      <t>Listing 5 contains a JSON Schema that can be used to validate incoming IDMEF
            messages prior to processing. Please note that extraneous linebreaks have been
            included due to formatting constraints.</t>
      <sourcecode type="none">{
    "description": "JSON schema for the Incident Detection Message Exchange Format (IDMEF) version 2",
    "properties": {
        "Version": {
            "description": "The version of the IDMEF format in use by this alert.",
            "type": "string",
            "pattern": "^2\\.[A-Z]\\.V[0-9]{2}$"
        },
        "ID": {
            "description": "Unique identifier for the alert.",
            "$ref": "#/definitions/uuidType"
        },
        "OrganisationName": {
            "description": "Corporate/Main Office Organisation Name Useful if alerts are sent to a multi-organisation incident detection system. Example: ACME Corporation",
            "type": "string"
        },
        "OrganisationId": {
            "description": "Corporate/Main Office Organisation ID. Where possible official organisation ID manage by national authority.",
            "type": "string"
        },
        "EntityName": {
            "description": "Entity Name, monitored by the organisation, where the incident occurred.",
            "type": "string"
        },
        "EntityId": {
            "description": "Entity ID, monitored by the organisation, where the incident occurred.",
            "type": "string"
        },
        "EntitySector": {
            "description": "Economic sector(s) and sub-sector(s) in which the entity operates.",
            "type": "array",
            "items": {
                "type": "string"
            }
        },
        "Type": {
            "description": "Incident type.",
            "type": "array",
            "items": {
                "$ref": "#/definitions/alertTypeEnum"
            }
        },
        "Category": {
            "description": "Incident category.",
            "type": "array",
            "items": {
                "$ref": "#/definitions/alertCategoryEnum"
            }
        },
        "ext-Category": {
            "description": "A means by which to extend the Category attribute.",
            "type": "string"
        },
        "Cause": {
            "description": "Incident cause.",
            "$ref": "#/definitions/causeEnum"
        },
        "Description": {
            "description": "Short free text human-readable description of the event.",
            "type": "string"
        },
        "Status": {
            "description": "Event state in the overall event lifecycle.",
            "$ref": "#/definitions/statusEnum"
        },
        "Priority": {
            "description": "Priority of the alert.",
            "$ref": "#/definitions/priorityEnum"
        },
        "Confidence": {
            "description": "A floating-point value between 0 and 1 indicating the analyzer's confidence.",
            "type": "number",
            "minimum": 0,
            "maximum": 1
        },
        "Note": {
            "description": "Free text human-readable additional note.",
            "type": "string"
        },
        "CreateTime": {
            "description": "Timestamp indicating when the alert was created.",
            "$ref": "#/definitions/timestampType"
        },
        "StartTime": {
            "description": "Timestamp indicating the deduced start of the event.",
            "$ref": "#/definitions/timestampType"
        },
        "EndTime": {
            "description": "Timestamp indicating the deduced end of the event.",
            "$ref": "#/definitions/timestampType"
        },
        "AltNames": {
            "description": "Alternative identifiers.",
            "type": "array",
            "items": {
                "type": "string"
            }
        },
        "AltCategory": {
            "description": "Alternate categories from a reference other than ENISA-RIST.",
            "type": "array",
            "items": {
                "type": "string"
            }
        },
        "Ref": {
            "description": "References to sources of information related to the incident.",
            "type": "array",
            "items": {
                "type": "string",
                "format": "uri"
            }
        },
        "CorrelID": {
            "description": "Identifiers for the messages which were used as information sources.",
            "type": "array",
            "items": {
                "$ref": "#/definitions/uuidType"
            }
        },
        "AggrCondition": {
            "description": "A list of IDMEF fields used to aggregate events.",
            "type": "array",
            "items": {
                "type": "string"
            }
        },
        "PredID": {
            "description": "A list containing the identifiers of previous messages which are obsoleted.",
            "type": "array",
            "items": {
                "$ref": "#/definitions/uuidType"
            }
        },
        "RelID": {
            "description": "A list containing the identifiers of other messages related to this message.",
            "type": "array",
            "items": {
                "$ref": "#/definitions/uuidType"
            }
        },
        "Analyzer": {
            "type": "object",
            "description": "The Analyzer class describes the module that has analyzed the data.",
            "properties": {
                "ID": {
                    "description": "Unique identifier for the analyzer.",
                    "$ref": "#/definitions/uuidType"
                },
                "IP": {
                    "description": "Analyzer IP address.",
                    "$ref": "#/definitions/ipType"
                },
                "Name": {
                    "description": "Name of the analyzer.",
                    "type": "string"
                },
                "Hostname": {
                    "description": "Hostname of this analyzer.",
                    "type": "string"
                },
                "Model": {
                    "description": "Analyzer model description.",
                    "type": "string"
                },
                "Category": {
                    "description": "Analyzer categories.",
                    "type": "array",
                    "items": {
                        "$ref": "#/definitions/analyzerCategoryEnum"
                    }
                },
                "ext-Category": {
                    "description": "A means by which to extend the Category attribute.",
                    "type": "string"
                },
                "Data": {
                    "description": "Type of data analyzed during the detection.",
                    "type": "array",
                    "items": {
                        "$ref": "#/definitions/analyzerDataEnum"
                    }
                },
                "ext-Data": {
                    "description": "A means by which to extend the Data attribute.",
                    "type": "string"
                },
                "Method": {
                    "description": "Detection method.",
                    "type": "array",
                    "items": {
                        "$ref": "#/definitions/analyzerMethodEnum"
                    }
                },
                "ext-Method": {
                    "description": "A means by which to extend the Method attribute.",
                    "type": "string"
                },
                "GeoLocation": {
                    "description": "GPS coordinates for the analyzer.",
                    "$ref": "#/definitions/geolocType"
                },
                "UnLocation": {
                    "description": "Standard UN/Locode for the analyzer.",
                    "$ref": "#/definitions/unlocodeType"
                },
                "Location": {
                    "description": "Internal name for the location of the analyzer.",
                    "type": "string"
                }
            },
            "additionalProperties": false,
            "type": "object",
            "required": ["Name"]
        },
        "Sensor": {
            "type": "array",
            "items": {
                "description": "The Sensor class describes the module that captured the data.",
                "properties": {
                    "ID": {
                        "description": "Unique identifier for the sensor.",
                        "$ref": "#/definitions/uuidType"
                    },
                    "IP": {
                        "description": "The sensor's IP address.",
                        "$ref": "#/definitions/ipType"
                    },
                    "Name": {
                        "description": "Name of the sensor.",
                        "type": "string"
                    },
                    "Hostname": {
                        "description": "The sensor's hostname.",
                        "type": "string"
                    },
                    "Model": {
                        "description": "The sensor model's description.",
                        "type": "string"
                    },
                    "GeoLocation": {
                        "description": "GPS coordinates for the sensor.",
                        "$ref": "#/definitions/geolocType"
                    },
                    "UnLocation": {
                        "description": "Standard UN/Locode for the sensor.",
                        "$ref": "#/definitions/unlocodeType"
                    },
                    "Location": {
                        "description": "Internal name for the location of the sensor.",
                        "type": "string"
                    },
                    "CaptureZone": {
                        "description": "A string that describes the capture zone of the sensor.",
                        "type": "string"
                    }
                },
                "additionalProperties": false,
                "type": "object",
                "required": ["Name"]
            }
        },
        "Source": {
            "type": "array",
            "items": {
                "description": "The Source class describes the origin(s) of the event(s).",
                "properties": {
                    "ID": {
                        "description": "Unique identifier for the source.",
                        "$ref": "#/definitions/uuidType"
                    },
                    "IP": {
                        "description": "Source IP address.",
                        "$ref": "#/definitions/ipType"
                    },
                    "Hostname": {
                        "description": "Hostname of this source.",
                        "type": "string"
                    },
                    "Note": {
                        "description": "Free text human-readable additional note for this source.",
                        "type": "string"
                    },
                    "TI": {
                        "description": "Threat Intelligence data about the source.",
                        "type": "array",
                        "items": {
                            "type": "string"
                        }
                    },
                    "User": {
                        "description": "User ID or login responsible for the incident.",
                        "type": "string"
                    },
                    "Email": {
                        "description": "Email address responsible for the incident.",
                        "type": "string",
                        "format": "email"
                    },
                    "Protocol": {
                        "description": "Protocols related to connections from/to this source.",
                        "type": "array",
                        "items": {
                            "$ref": "#/definitions/protocolType"
                        }
                    },
                    "Port": {
                        "description": "Source ports involved in the incident.",
                        "type": "array",
                        "items": {
                            "type": "integer",
                            "minimum": 1,
                            "maximum": 65535
                        }
                    },
                    "GeoLocation": {
                        "description": "GPS coordinates for the source.",
                        "$ref": "#/definitions/geolocType"
                    },
                    "UnLocation": {
                        "description": "Standard UN/Locode for the source.",
                        "$ref": "#/definitions/unlocodeType"
                    },
                    "Location": {
                        "description": "Internal name for the location of the source.",
                        "type": "string"
                    },
                    "Attachment": {
                        "description": "Identifiers for attachments related to this source.",
                        "type": "array",
                        "items": {
                            "$ref": "#/definitions/attachmentNameType"
                        }
                    }
                },
                "additionalProperties": false,
                "type": "object"
            }
        },
        "Target": {
            "type": "array",
            "items": {
                "description": "The Target class describes the target(s) impacted by the event(s).",
                "properties": {
                    "ID": {
                        "description": "Unique identifier for the target.",
                        "$ref": "#/definitions/uuidType"
                    },
                    "IP": {
                        "description": "Target IP address.",
                        "$ref": "#/definitions/ipType"
                    },
                    "Hostname": {
                        "description": "Hostname of this target.",
                        "type": "string"
                    },
                    "Note": {
                        "description": "Free text human-readable additional note for this target.",
                        "type": "string"
                    },
                    "Service": {
                        "description": "Service or process impacted by the incident.",
                        "type": "string"
                    },
                    "User": {
                        "description": "User ID or login impacted by the incident.",
                        "type": "string"
                    },
                    "Email": {
                        "description": "Email address impacted by the incident.",
                        "type": "string",
                        "format": "email"
                    },
                    "Port": {
                        "description": "Target ports involved in the incident.",
                        "type": "array",
                        "items": {
                            "type": "integer",
                            "minimum": 1,
                            "maximum": 65535
                        }
                    },
                    "GeoLocation": {
                        "description": "GPS coordinates for the target.",
                        "$ref": "#/definitions/geolocType"
                    },
                    "UnLocation": {
                        "description": "Standard UN/Locode for the target.",
                        "$ref": "#/definitions/unlocodeType"
                    },
                    "Location": {
                        "description": "Internal name for the location of the target.",
                        "type": "string"
                    },
                    "Attachment": {
                        "description": "Identifiers for attachments related to this target.",
                        "type": "array",
                        "items": {
                            "$ref": "#/definitions/attachmentNameType"
                        }
                    }
                },
                "additionalProperties": false,
                "type": "object"
            }
        },
        "Attachment": {
            "type": "array",
            "items": {
                "description": "The Attachment class contains additional data captured in relation with the event.",
                "properties": {
                    "Name": {
                        "description": "A unique identifier among attachments.",
                        "$ref": "#/definitions/attachmentNameType"
                    },
                    "FileName": {
                        "description": "Attachment filename.",
                        "type": "string"
                    },
                    "Hash": {
                        "description": "A list of hash results for the attachment's Content.",
                        "type": "array",
                        "items": {
                            "$ref": "#/definitions/hashType"
                        }
                    },
                    "Size": {
                        "description": "Length of the content (in bytes).",
                        "type": "integer",
                        "minimum": 0
                    },
                    "Ref": {
                        "description": "References to sources of information related to this attachment.",
                        "type": "array",
                        "items": {
                            "type": "string",
                            "format": "uri"
                        }
                    },
                    "ExternalURI": {
                        "description": "URI to an external resource for the attachment's content.",
                        "type": "array",
                        "items": {
                            "type": "string",
                            "format": "uri"
                        }
                    },
                    "Note": {
                        "description": "Free text human-readable additional note for this attachment.",
                        "type": "string"
                    },
                    "ContentType": {
                        "description": "Internet Media Type of the attachment.",
                        "$ref": "#/definitions/mediatypeType"
                    },
                    "ContentEncoding": {
                        "description": "Content encoding.",
                        "type": "string",
                        "enum": ["json", "base64"]
                    },
                    "Content": {
                        "description": "The attachment's content.",
                        "type": "string"
                    }
                },
                "additionalProperties": false,
                "type": "object",
                "required": ["Name"]
            }
        }
    },
    "additionalProperties": false,
    "type": "object",
    "required": ["Analyzer", "Version", "ID", "CreateTime"],
    "definitions": {
        "alertTypeEnum": {
            "enum": ["Cyber", "Physical", "Availability", "Combined"],
            "description": "Possible incident types"
        },
        "alertCategoryEnum": {
            "enum": [
                "Abuse.Grooming", "Abuse.Harassment", "Abuse.Coercion", "Abuse.Trafficking",
                "Abuse.Extremism", "Abuse.Other", "Access.Compromise", "Access.Escalation",
                "Access.Backdoor", "Access.Unauthorized", "Access.Tailgating", "Access.Forced",
                "Access.Lost", "Access.Cloned", "Access.Authorized", "Access.Other",
                "Availability.DoS", "Availability.DDoS", "Availability.Outage", "Availability.Failure",
                "Availability.Misconfiguration", "Availability.Overload", "Availability.HeartBeat",
                "Availability.Other", "Fraud.Usage", "Fraud.Copyright", "Fraud.Masquerade",
                "Fraud.Phishing", "Fraud.Corruption", "Fraud.Espionage", "Fraud.Other",
                "Insider.Malicious", "Insider.Negligent", "Insider.Other", "Sabotage.Vandalism",
                "Sabotage.Graffiti", "Sabotage.Destruction", "Sabotage.Tampering", "Sabotage.Equipment",
                "Sabotage.Disruption", "Sabotage.Data", "Sabotage.Other", "Safety.Explosion",
                "Safety.Fire", "Safety.Aggression", "Safety.Sexual", "Safety.Accident",
                "Safety.Hostage", "Safety.Other", "SupplyChain.Disruption", "SupplyChain.Compromise",
                "SupplyChain.Other", "Theft.Equipment", "Theft.Data", "Theft.Machinery", "Theft.PII",
                "Theft.IP", "Theft.FinInfo", "Theft.Breach", "Theft.Other", "Operational.Misuse",
                "Operational.PolicyViolation", "Operational.ProcessFailure", "Operational.Other",
                "Recon.Network", "Recon.Landscape", "Recon.Aerial", "Recon.OSINT", "Recon.Other",
                "National.Terrorism", "National.Conflict", "National.Cyber", "National.Crime",
                "National.Environmental", "National.Economic", "National.Societal", "National.Other",
                "SocialEng.Phishing", "SocialEng.SpearPhishing", "SocialEng.Vishing", "SocialEng.Smishing",
                "SocialEng.Pretexting", "SocialEng.Baiting", "SocialEng.QuidProQuo", "SocialEng.Other",
                "Malware.Virus", "Malware.Worm", "Malware.Trojan", "Malware.Ransomware",
                "Malware.Spyware", "Malware.Adware", "Malware.Rootkit", "Malware.Other",
                "Geophysical.Earthquake", "Geophysical.MassMovement", "Geophysical.Volcanic", "Geophysical.Other",
                "Meteo.Heat", "Meteo.Cold", "Meteo.Fog", "Meteo.Rain", "Meteo.Snow", "Meteo.Wind",
                "Meteo.Other", "Hydro.Flood", "Hydro.Landslide", "Hydro.Wave", "Hydro.Other",
                "Climat.Drought", "Climat.LakeOutburst", "Climat.Wildfire", "Climat.Other",
                "Biological.Epidemic", "Biological.Insect", "Biological.Animal", "Biological.Zombies",
                "Biological.Other", "Extraterrestrial.Impact", "Extraterrestrial.Aliens",
                "Extraterrestrial.SpaceWeather", "Extraterrestrial.Other", "Other.Uncategorized",
                "Other.Undetermined", "Other.Test", "ext-value"
            ],
            "description": "Possible incident categories"
        },
        "causeEnum": {
            "enum": ["Normal", "Error", "Malicious", "Malfunction", "Hazard", "Unknown"],
            "description": "Possible incident causes"
        },
        "statusEnum": {
            "enum": ["Event", "Incident", "Open", "Closed", "FalsePositive"],
            "description": "Possible incident statuses"
        },
        "priorityEnum": {
            "enum": ["Unknown", "Info", "Low", "Medium", "High"],
            "description": "Possible incident priorities"
        },
        "analyzerCategoryEnum": {
            "enum": [
                "Undetermined", "APP.BAST", "APP.DAST", "APP.IAST", "APP.RASP", "APP.SAST",
                "CLD.CASB", "CLD.CIEM", "CLD.CSPM", "CLD.CWPP", "DDoS.ANTI-DDOS", "DDoS.SCRUB",
                "DDoS.WAF-DDOS", "EMAIL.ANTI-PHISH", "EMAIL.DMARC", "EMAIL.SEG", "EMAIL.SPAM-FILTER",
                "END.AM", "END.AV", "END.DLP-EP", "END.EDR", "END.EPP", "END.HIDS", "END.HIPS",
                "END.HPT", "END.RASP", "ID.DCAP", "ID.DLP", "ID.IAM", "ID.IRM", "ID.PAM", "ID.PIM",
                "ID.UEBA", "NET.DNS-FW", "NET.DPI", "NET.FW", "NET.NAC", "NET.NBAD", "NET.NDR",
                "NET.NGFW", "NET.NIDS", "NET.NIPS", "NET.PROXY", "NET.WAF", "NET.WIDS", "NET.WIPS",
                "OT.IoT-IDS", "OT.OT-IDS", "OT.PLC-SCAN", "PHY.1D-LAS", "PHY.1D-LiDAR", "PHY.2D-LAS",
                "PHY.2D-LiDAR", "PHY.3D-LAS", "PHY.3D-LiDAR", "PHY.ACCESS-CTRL", "PHY.ADS",
                "PHY.FR-CAM", "PHY.GLASS-BRK", "PHY.HAR", "PHY.LWIR", "PHY.MOT-SEN", "PHY.MWIR",
                "PHY.OBJ-DET", "PHY.SWIR", "PHY.VAD", "PHY.VNIR", "SIEM.ETL", "SIEM.LOG", "SIEM.NMS",
                "SIEM.SIEM", "SIEM.SOAR", "TI.CTI", "TI.TI-FEED", "TI.TIP", "VM.ASM", "VM.PENTEST",
                "VM.VULN-SCANNER", "ext-value"
            ],
            "description": "Possible analyzer categories"
        },
        "analyzerDataEnum": {
            "enum": [
                "Undetermined", "Light", "Acoustics", "Contact", "Vibration", "Temperature",
                "Humidity", "Rain", "Water", "Fog", "Particles", "Seismic", "Magnetic",
                "Images", "Thermal", "Lidar", "Network", "Flow", "Protocol", "Datagram",
                "Host", "Connection", "Port", "SNMP", "Authentication", "Log", "File",
                "Content", "Data", "Reporting", "Alert", "Relay", "External", "ext-value"
            ],
            "description": "Possible analyzer data types"
        },
        "analyzerMethodEnum": {
            "enum": [
                "Undetermined", "AI", "Anomaly", "Behavioral", "Biometric", "Blackhole",
                "Contextual", "Correlation", "Ensemble", "Fingerprinting", "Frequency",
                "Fusion", "Geolocation", "Graph-based", "Heat", "Heuristic", "Honeypot",
                "Hygiene", "Integrity", "Metadata", "Monitor", "Movement", "Orchestration",
                "Pattern", "Policy", "Predictive", "Protocol", "Recon", "Reputation",
                "Rule-based", "Sequence", "Signature", "Statistical", "Tarpit",
                "ThreatIntelligence", "Threshold", "Trend", "ext-value"
            ],
            "description": "Possible analyzer methods"
        },
        "attachmentNameType": {
            "description": "A unique identifier among attachments.",
            "type": "string",
            "pattern": "^[a-zA-Z0-9]+$"
        },
        "timestampType": {
            "description": "A JSON string containing a timestamp conforming to RFC 3339.",
            "type": "string",
            "pattern": "^[0-9]{4}-(0[0-9]|1[012])-([0-2][0-9]|3[01])T([0-1][0-9]|2[0-3]):[0-5][0-9]:([0-5][0-9]|60)(\\.[0-9]+)?(Z|[-+]([0-1][0-9]|2[0-3]):[0-5][0-9])?$"
        },
        "geolocType": {
            "description": "Geolocation coordinates (e.g. \"+48.75726, +2.299528, +65.1\").",
            "type": "string",
            "pattern": "^[-+]?([0-9]+(\\.[0-9]*)?)(, ?[-+]?([0-9]+(\\.[0-9]*)?)){1,2}$"
        },
        "unlocodeType": {
            "description": "A valid UN/LOCODE location (e.g. \"FR PAR\").",
            "type": "string",
            "pattern": "^[A-Z]{2} ?[A-Z]{3}$"
        },
        "ipType": {
            "description": "An Internet Protocol address, either version 4 or version 6.",
            "type": "string",
            "pattern": "^(((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.){3}(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)|([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))$"
        },
        "mediatypeType": {
            "description": "A valid media type (e.g. \"text/plain\").",
            "type": "string",
            "pattern": "^[-!#$%&amp;'*+.^_`|~0-9a-zA-Z]+/[-!#$%&amp;'*+.^_`|~0-9a-zA-Z]+([ \t]*;[ \t]*[-!#$%&amp;'*+.^_`|~0-9a-zA-Z]+=([-!#$%&amp;'*+.^_`|~0-9a-zA-Z]+|\"([]-~\t !#-[\\x80-\\xFF]|\\\\([\t 0-9a-zA-Z\\x80-\\xFF]))*\"))*$"
        },
        "uuidType": {
            "description": "Canonical textual representation for an UUID (e.g. \"e5f9bbae-163e-42f9-a2f2-0daaf78fefb1\")",
            "type": "string",
            "pattern": "^[0-9A-Fa-f]{8}(-[0-9A-Fa-f]{4}){3}-[0-9A-Fa-f]{12}$"
        },
        "protocolType": {
            "description": "A service or protocol name from the IANA registry.",
            "type": "string",
            "pattern": "^[a-zA-Z0-9](-?[a-zA-Z0-9])*$"
        },
        "hashType": {
            "description": "A cryptographic hash (e.g. \"sha256:a02735ed8b10ad432d557bd4849c0dac3b23d64706e0618716d6df2def338374\")",
            "type": "string",
            "pattern": "^[a-zA-Z0-9-]+:([a-fA-F0-9]{2})+$"
        }
    },
    "$schema": "http://json-schema.org/draft-06/schema#",
    "title": "IDMEF 2"
}</sourcecode>
    </section>
  </back>
</rfc>
