This is only example, but almost all attacks looks very similar
0) Only bearing and bearing rate
1) waiting for TMA data, identification
2) waiting for more TMA data, identification, you have course with medium error
3) you have range, course with medium error
4) you have speed with medium error and range/course with small error
5) you have speed without error (DEMON) and all data with small error
6) preparation for attack, you have all data
Like I said before, methods for ploting "course of interception" are crap in real situations.