Analyzing Threat Intel and Malware logs presents a key opportunity for security teams to enhance their perception of new threats . These logs often contain valuable information regarding harmful campaign tactics, methods , and procedures (TTPs). By meticulously reviewing Threat Intelligence repor