Skip to content

Incident Classification Taxonomy

Document ID: IR-SOP-016 Version: 1.0 Classification: Internal Last Updated: 2026-02-15

Consistent classification is critical for accurate metrics, proper escalation, and compliance reporting. This taxonomy ensures every analyst classifies incidents the same way.


Classification Hierarchy

graph TD
    INC[🔔 New Incident] --> CAT[1. Category]
    CAT --> SUB[2. Sub-Category]
    SUB --> SEV[3. Severity P1-P4]
    SEV --> SCOPE[4. Scope]
    SCOPE --> TTP[5. MITRE ATT&CK TTP]
    TTP --> CLASSIFIED[✅ Fully Classified]

    style INC fill:#3b82f6,color:#fff
    style CLASSIFIED fill:#22c55e,color:#fff

Every incident MUST be classified along 5 dimensions before triage is complete.


1. Incident Categories

Code Category Description Example
MAL Malware Malicious software detected or executed Ransomware, trojan, worm, cryptominer
PHI Phishing / Social Engineering Deception targeting people Email phishing, vishing, smishing, BEC
UNA Unauthorized Access Illegitimate access to systems or data Brute force, credential stuffing, stolen creds
PRV Privilege Escalation Gaining higher privileges than authorized Local privilege escalation, admin abuse
LAT Lateral Movement Attacker moving between systems Pass-the-hash, RDP abuse, WMI execution
EXF Data Exfiltration / Leakage Unauthorized data leaving the organization DNS tunneling, cloud upload, USB copy
DOS Denial of Service Disrupting availability DDoS, application-layer flood, resource exhaustion
WEB Web Application Attack Targeting web services SQLi, XSS, SSRF, path traversal
INS Insider Threat Threats from within the organization Data theft by employee, sabotage, policy violation
CLD Cloud / SaaS Incident Cloud-specific security events IAM misconfiguration, exposed bucket, token theft
SUP Supply Chain Compromise through trusted third party Compromised update, dependency hijack
VUL Vulnerability Exploitation Exploiting known or zero-day vulnerabilities CVE exploitation, zero-day, misconfiguration
POL Policy Violation Violation of security policies Shadow IT, unapproved software, data mishandling
PHY Physical Security Physical security breaches Lost device, tailgating, unauthorized facility access
OTH Other / Unclassified Does not fit any category above

2. Sub-Categories (by Parent Category)

MAL — Malware Sub-Categories | Code | Sub-Category | Description | |:---:|:---|:---| | MAL-RAN | Ransomware | Encryption + ransom demand | | MAL-TRO | Trojan / RAT | Remote access backdoor | | MAL-WRM | Worm | Self-propagating malware | | MAL-CRY | Cryptominer | Unauthorized mining activity | | MAL-BOT | Botnet | Part of command & control network | | MAL-WIP | Wiper | Destructive malware (data destruction) | | MAL-DRP | Dropper / Loader | Downloads and installs additional malware | | MAL-PUP | PUP / Adware | Potentially unwanted program |
PHI — Phishing / Social Engineering Sub-Categories | Code | Sub-Category | Description | |:---:|:---|:---| | PHI-EML | Email Phishing | Malicious email with link or attachment | | PHI-SPR | Spear Phishing | Targeted phishing against specific individuals | | PHI-BEC | Business Email Compromise | Impersonation for financial fraud | | PHI-VSH | Vishing | Voice-based social engineering | | PHI-SMI | Smishing | SMS-based phishing | | PHI-QRS | QR Phishing (Quishing) | Malicious QR codes |
UNA — Unauthorized Access Sub-Categories | Code | Sub-Category | Description | |:---:|:---|:---| | UNA-BRU | Brute Force | Password guessing attack | | UNA-CRD | Credential Theft | Stolen or compromised credentials | | UNA-IMP | Impossible Travel | Login from geographically impossible location | | UNA-MFA | MFA Bypass / Fatigue | Circumventing multi-factor authentication | | UNA-DEF | Default Credentials | Using unchanged default passwords | | UNA-SSO | SSO / Token Abuse | OAuth token theft or replay |
CLD — Cloud / SaaS Sub-Categories | Code | Sub-Category | Description | |:---:|:---|:---| | CLD-IAM | IAM Misconfiguration | Overly permissive roles or policies | | CLD-EXP | Public Exposure | Publicly accessible storage/service | | CLD-TOK | Token / Key Leak | API keys or tokens exposed | | CLD-CFG | Infrastructure Misconfiguration | Security group, network, or config issue | | CLD-BIL | Billing Anomaly | Unexpected cost increase (possible compromise) |
EXF — Data Exfiltration Sub-Categories | Code | Sub-Category | Description | |:---:|:---|:---| | EXF-DNS | DNS Tunneling | Data exfiltration via DNS | | EXF-WEB | Web Upload | Upload to cloud storage / paste site | | EXF-USB | Removable Media | Data copy to USB/external drive | | EXF-EML | Email | Bulk data sent via email | | EXF-ENC | Encrypted Channel | Exfiltration over encrypted tunnel |

3. Severity Classification

Reference: Severity Matrix for full definitions.

Severity Impact Criteria Examples
P1 🔴 Critical Immediate business impact, data breach, multiple systems compromised Active ransomware, confirmed data breach, compromise of critical infrastructure
P2 🟠 High Significant impact, single system compromised, potential for spread Confirmed malware, account takeover, lateral movement detected
P3 🟡 Medium Limited impact, contained or potential threat Phishing (no click), policy violation, suspicious but unconfirmed
P4 🔵 Low Minimal/no impact, informational False positive, vulnerability scan finding, known acceptable risk

Severity Scoring Formula

Use this formula when severity is not immediately obvious:

Factor Weight Score 1 (Low) Score 2 (Med) Score 3 (High) Score 4 (Critical)
Confidentiality Impact No data Internal data Customer PII Financial/health data
Number of Systems 1 system 2–10 systems 11–100 systems 100+ / critical infra
Active Threat Historical/FP Possible Likely Confirmed active
Containment Already contained Partially contained Not contained Spreading

Score Thresholds: - 10–15 → P4, 16–25 → P3, 26–35 → P2, 36–40 → P1


4. Scope Classification

Scope Definition Example
Individual Single user or endpoint affected One laptop with malware
Departmental Multiple users/systems in one department Finance team phishing campaign
Organizational Affects multiple departments or sites Ransomware spreading across network
External Involves third parties, customers, or public Customer data breach, public exposure
Industry Part of a wider campaign targeting the sector APT targeting financial sector

5. MITRE ATT&CK Mapping

Every incident MUST be mapped to at least one ATT&CK technique.

Tactic Common Techniques Example Incident
Initial Access T1566 (Phishing), T1190 (Exploit), T1133 (External Remote Services) Phishing email with macro
Execution T1059 (Command/Scripting), T1204 (User Execution) PowerShell download cradle
Persistence T1053 (Scheduled Task), T1547 (Boot/Logon Autostart) New scheduled task for backdoor
Privilege Escalation T1548 (Abuse Elevation), T1068 (Exploitation for PE) Local admin exploit
Defense Evasion T1027 (Obfuscation), T1070 (Indicator Removal) Log clearing after compromise
Credential Access T1003 (OS Credential Dumping), T1110 (Brute Force) LSASS memory dump
Discovery T1087 (Account Discovery), T1018 (Remote System Discovery) AD enumeration
Lateral Movement T1021 (Remote Services), T1570 (Lateral Tool Transfer) PsExec to domain controller
Collection T1560 (Archive Collected Data), T1114 (Email Collection) Zip file staging
C2 T1071 (Application Layer Protocol), T1572 (Protocol Tunneling) HTTPS beacon to C2 server
Exfiltration T1048 (Exfiltration Over Alternative Protocol), T1567 (Exfil Over Web Service) DNS tunneling data out
Impact T1486 (Data Encrypted for Impact), T1489 (Service Stop) Ransomware encryption

Classification Workflow

flowchart TD
    A[Alert Received] --> B[Assign Category Code]
    B --> C[Assign Sub-Category]
    C --> D[Determine Severity P1-P4]
    D --> E[Determine Scope]
    E --> F[Map to MITRE TTP]
    F --> G{All 5 fields filled?}
    G -->|Yes| H[✅ Classification Complete]
    G -->|No| I[🔄 Gather more info]
    I --> B
    H --> J[Proceed to Investigation]

    style A fill:#3b82f6,color:#fff
    style H fill:#22c55e,color:#fff
    style I fill:#f59e0b,color:#fff

Ticket Classification Template

Category:      [MAL/PHI/UNA/PRV/LAT/EXF/DOS/WEB/INS/CLD/SUP/VUL/POL/PHY/OTH]
Sub-Category:  [e.g., MAL-RAN]
Severity:      [P1/P2/P3/P4]
Scope:         [Individual/Departmental/Organizational/External/Industry]
MITRE TTP:     [T-code(s), e.g., T1486, T1059.001]

Reclassification Rules

Trigger Action
New evidence changes impact assessment Reclassify severity, document reason
Additional systems found compromised Upgrade scope, consider severity upgrade
Root cause changes category Update category & sub-category
False positive confirmed Downgrade to P4 or close
Escalation timeline exceeded Auto-upgrade by one severity level

⚠️ All reclassifications must be documented with timestamp and reason in the ticket.


Classification Metrics

Track these metrics to ensure consistent classification:

Metric Target Why It Matters
% of incidents fully classified ≥ 95% Ensures taxonomy adoption
Reclassification rate < 15% Indicates initial accuracy
Time to classify < 10 min Ensures triage speed
MITRE coverage (unique techniques seen) Track trend Measures threat landscape visibility
Category distribution Track monthly Identifies trends and emerging threats