Resource where data was exfiltrated from or exfiltrated to.
The resource's `full resource
Subcomponents of the asset that was
exfiltrated, like URIs used during exfiltration,
table names, databases, and filenames. For
example, multiple tables might have been
exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from
the same Cloud Storage bucket.