The use of intelligence information is very varied. The objective in this case is to help users of threat intelligence systems to develop their use. Among these, we can find: SOC analysts, incident response teams and digital forensic investigators, CTI analysts, threat investigators and intelligence producers, fraud analysts, vulnerability analysts, decision makers, IT managers / managers and executives.