Analyzing FireEye Intel and InfoStealer logs presents a key opportunity for security teams to improve their perception of current threats . These logs often contain useful data regarding malicious campaign tactics, techniques , and processes (TTPs). By thoroughly examining Intel reports alongside