From Threat to Action: LLM-Powered Attack-Driven Threat Intelligence Extraction