Making Threat Patterns Useful - Breaking the Bonds of Kill Chain and Malware Fetishes