Conduct your own research and discuss with the group the following:

Field Techniques of Comparison? 
Rules for Based Matching?
What is Fuzzy Matching?

Bonus point
How threat actors can evade detection via threat correlation ?