PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Data exfiltrationThe adversary extracts information from the network using network protocols and ports allowed by the organisation, such as HTTPS, HTTP, or in some cases DNS and email.
http://www.w3.org/ns/prov#wasQuotedFrom
  • microsoft.com