Analyze Threat Logs for Indicators of Compromise