An Empirical Analysis On Threat Intelligence: Data Characteristics And Real-World Uses