Analyzing FireEye Intel and Malware logs presents a vital opportunity for threat teams to enhance their knowledge of current attacks. These files often contain useful information regarding dangerous actor tactics, techniques , and procedures (TTPs). By carefully analyzing Threat Intelligence reports alongside Malware log information, investigators