Red Vs Blue CTI– How Threat Actors Prepare their Attacks and How Defenders Operationalize Threat Intel