This paper focuses on critical concepts and practical details, where necessary, to produce a world-class threat intelligence capability from scratch.