| http://www.w3.org/ns/prov#value | - The reported included data such as IP addresses, email header information, remote desktop connections and malware make-up that were used in the attacks and which can be used by security professionals to learn if they have been targeted or compromised by that group or similar ones.
|