We should consider adding properties for the structured capture of exploit code data, perhaps as part of a MAEC Behavior.