ANNEX IV
DATA GLOSSARY AND INSTRUCTIONS FOR NOTIFICATION OF SIGNIFICANT CYBER THREATS
Data field |
Description |
Mandatory field |
Field type |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Full legal name of the entity submitting the notification. |
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Identification code of the entity submitting the notification. Where financial entities submit the notification/report, the identification code shall be a Legal Entity Identifier (LEI), which is a unique 20 alphanumeric character code, based on ISO 17442-1:2020. Where a third-party provider submits a report for a financial entity, it may use an identification code as specified in the implementing technical standards adopted pursuant to Article 28(9) of Regulation (EU) 2022/2554. |
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Type of the entity referred to in Article 2(1), points (a) to (t) of Regulation (EU) 2022/2554 submitting the report. |
Yes, if the report is not provided by the affected financial entity directly. |
Choice (multiselect):
|
||||||||||||||||||||||||||||||||||||||||||||||||
|
Full legal name of the financial entity notifying the significant cyber threat. |
Yes, if the financial entity is different from the entity submitting the notification |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Legal Entity Identifier (LEI) of the financial entity notifying the significant cyber threat, assigned in accordance with the International Organisation for Standardisation. |
Yes, if the financial entity notifying the significant cyber threat is different from the entity submitting the report |
Unique alphanumeric 20 character code, based on ISO 17442-1:2020 |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Name and surname of the primary contact person of the financial entity. |
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Email address of the primary contact person that can be used by the competent authority for follow-up communication. |
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
The telephone number of the primary contact person that can be used by the competent authority for follow-up communication. The telephone number shall be reported with all international prefixes (e.g. +33XXXXXXXXX) |
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Name and surname of the second contact person of the financial entity or an entity submitting the notification on behalf of the financial entity, where available. |
Yes, if name and surname of the second contact person of the financial entity or an entity submitting the notification for the financial entity is available |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Email address of the second contact person or a functional email address of the team that can be used by the competent authority for follow-up communication, where available. |
Yes, if email address of the second contact person or a functional email address of the team that can be used by the competent authority for follow-up communication is available |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
The telephone number of the second contact person that can be used by the competent authority for follow-up communication, where available. The telephone number shall be reported with all international prefixes (e.g. +33XXXXXXXXX). |
Yes, if the telephone number of the second contact person that can be used by the competent authority for follow-up communication is available |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Date and time at which the financial entity has become aware of the significant cyber threat. |
Yes |
ISO 8601 standard UTC (YYYY-MM-DD Thh: mm:ss) |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Description of the most relevant aspects of the significant cyber threat. Financial entities shall provide:
|
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Information about the potential impact of the cyber threat on the financial entity, its clients or financial counterparts if the cyber threat has materialised |
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
The classification criteria that could have triggered a major incident report if the cyber threat had materialised. |
Yes |
Choice (multiple):
|
||||||||||||||||||||||||||||||||||||||||||||||||
|
Information about the status of the cyber threat for the financial entity and whether there have been any changes in the threat activity. Where the cyber threat has stopped communicating with the financial entity’s information systems, the status can be marked as inactive. If the financial entity has information that the threat remains active against other parties or the financial system as a whole, the status shall be marked as active. |
Yes |
Choice:
|
||||||||||||||||||||||||||||||||||||||||||||||||
|
High-level information about the actions taken by the financial entity to prevent the materialisation of the significant cyber threats, if applicable. |
Yes |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Information about notification of the cyber threat to other financial entities or authorities. |
Yes, if other financial entities or authorities have been informed about the cyber threat) |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Information related to the significant threat that may help identify malicious activity within a network or information system (Indicators of Compromise, or IoC), where applicable. The IoC provided by the financial entity may include, but is not to be limited to, the following categories of data:
This type of information may include data relating to indicators describing patterns in network traffic corresponding to known attacks/botnet communications, IP addresses of machines infected with malware (bots), data relating to ‘command and control’ servers used by malware (usually domains or IP addresses), and URLs relating to phishing sites or websites observed hosting malware or exploit kits. |
Yes, if information about indicators of compromise connected with the cyber threat are available) |
Alphanumeric |
||||||||||||||||||||||||||||||||||||||||||||||||
|
Any other relevant information about the significant cyber threat |
Yes, if applicable and if there is other information available, not covered in the template |
Alphanumeric |
ELI: http://data.europa.eu/eli/reg_impl/2025/302/oj
ISSN 1977-0677 (electronic edition)