Rules: Potential malicious document executed Description A document was downloaded and opened followed shortly by an executable or dll download shortly thereafter Additional Details Detail Value Type Match Category Execution Apply Risk to Entities device_hostname, device_ip, srcDevice_hostname, srcDevice_ip, user_username Signal Name Potential malicious document executed Summary Expression Suspicious download detected from IP: {{srcDevice_ip}} Score/Severity Static: 2 Enabled by Default True Prototype False Tags _mitreAttackTactic:TA0002, _mitreAttackTechnique:T1204, _mitreAttackTechnique:T1204.002 Vendors and Products Bro - Bro Fields Used Origin Field Normalized Schema device_hostname Normalized Schema device_ip Normalized Schema metadata_deviceEventId Normalized Schema metadata_product Normalized Schema srcDevice_hostname Normalized Schema srcDevice_ip Normalized Schema threat_name Normalized Schema user_username