Malicious Document Analysis for SOC Analysts