Classifying Advanced Persistent Threat Stages and Techniques via Graph-Enhanced Network Flow Representations