File Name: ISO_MID_YYYMMDD_ReportedFraud.csv
|Position in CSV||Field||Description|
|1||ISO||4-Digit ID assigned by TabaPay|
|2||MID||Merchant ID (Identifies a specific program/merchant under the ISO)|
|5||Merchant Name||Merchant descriptor as it appears on the cardholder's statement|
|6||MCC||Merchant Category Code|
|7||ARN||Acquirer Reference Number|
|8||Card Number||Masked PAN|
|9||Original Transaction Date||Date of the original transaction|
|10||Original Transaction Amount||Amount of the original transaction|
|11||Reported Fraud Date||Date that fraud was reported|
|12||Network||Visa or Mastercard|
|13||Fraud Type||Numeric Visa and Mastercard Fraud Type Codes|
|14||Fraud Description||Text description of Visa and Mastercard Fraud Type Codes|
|0||Lost: Cardholder is NOT in possession of card and does not know what happened to it|
|1||Stolen: Cardholder is NOT in possession of card and may have an explanation as to how the card went missing (e.g. stolen wallet)|
|2||NRI: Not Received as Issued - card was mailed but never received by cardholder|
|3||Fraud Application: Account was opened based on true name or synthetic cardholder information|
|4||Counterfeit: Cardholder is in possession of card; Card Present transactions have occurred that were not made by the cardholder|
|5||Miscellaneous: Cannot be categorized under another Fraud Type, such as but not limited to:|
- Multiple draft imprints obtained unlawfully from a legitimate card.
- Unauthorized alterations to a sales draft.
|6||Fraudulent Use of Account Number: Account number used in the non-face-to-face environment (Card Not Present) including mail order, telephone order, recurring payments, installments and eCommerce (internet) transactions|
|A||Incorrect Processing: Fraudulent transaction was made possible due to incorrect processing. This type identifies situations in which lack of validating a security element was the factor that enabled fraud to occur. For example:|
- Fraudulent EMV transaction resulting from lack of cryptogram validation. Vulnerabilities in the implementation of EMV may allow fraudsters to use a chip cards with fake cryptograms.
- Fraudulent transaction on a magnetic stripe transaction resulting from lack of Card Verification Value (CVV) validation
|B||Account or Credential takeover: Fraud resulted from fraudsters taking over an account or credentials from a legitimate client. Examples may include:|
- Use of personally identifiable information (PII) to circumvent the issuer's authentication process or cardholder's stolen credentials for requesting a new bank- issued card for fraudulent use.
- Fraudulent use of card data and PII to circumvent the issuer's authentication process and enable provisioning of the payment card onto a mobile device / digital wallet, which is subsequently used for fraudulent purchases.
- Fraudulent use of the cardholder's digital wallet via stolen user credentials (i.e., mobile passcode, wallet login information).
|C||Merchant Misrepresentation: Fraud resulting from a merchant deliberately misleading the account holder. Examples may include:|
- A merchant fraudulently selling items that are not as they seem or sub- standard, charging more than anticipated or for a longer term, or charging for a service that the consumer can get for free through another channel for the purpose of conducting fraudulent activity.
|D||Manipulation of Account Holder: Fraud resulting from a merchant manipulating an account holder into completing what they believe to be a legitimate transaction. This fraud type has been added to support Visa Direct and European PSD2 regulations. Examples may include:|
- Account holder manipulated into sending funds to a fraudulent beneficiary when the sender believes they will gain fictitious riches or help an individual in distress, a struggling business, or to pay medical fees.
- A fraudster contacting the sender to impersonate a known supplier, trusted organization, or business in order to request a change of payment details for a transaction or to request a payment to a fraudulent account.
|00||Lost Fraud: A fraudulent transaction that occurs with the use of a lost card or other access device (or other instrument access an account for example, convenience and balance transfer checks) without the actual, implied, or apparent authority of the cardholder.|
|01||Stolen Fraud: A fraudulent transaction that occurs with the use of a stolen card or other access device (or other instrument accessing an account for example, convenience and balance transfer checks) without the actual, implied, or apparent authority of the cardholder.|
|02||Never Received Issue: The interception and use of a card or other access device (or other instrument access an account for example, convenience and balance transfer checks), before receipt by the cardholder, by a person without the actual, implied, or apparent authority of the cardholder.|
|03||Fraudulent Application: A fraudulent transaction that occurs with the use of card or other access device that was obtained with an application using a false name or other false identification information.|
|04||Counterfeit Card Fraud: The use of altered or illegally reproduced card or other access device (or other instrument access and account for example, convenience and balance transfer checks) including the replication or alteration of the magnetic stripe or embossing.|
|05||Account Takeover Fraud: An existing credit or debit account is used without the actual, implied, or apparent authority of the cardholder, by a person who gains access to and use of the account through an unauthorized means, such as a change of address or request for re-issuance of a card or other access device (or other instrument for accessing an account, for example, convenience and balance transfer checks) but not lost or stolen cards.|
|06||Card Not Present Fraud: A fraudulent transaction that occurs with the use of credit or debit account information including pseudo-account information without the card or other access device being involved, via the phone, mail, Internet, or other electronic means without the actual, implied, or apparent authority of the cardholder.|
|51||Bust-out Collusive Merchant: A collusive cardholder engaging in transactions with a collusive merchant as defined in the Mastercard Questionable Merchant Audit Program.|
Updated about 4 hours ago