This document discusses setting up an automated malware analysis sandbox using Cuckoo and Bro. It recommends using Cuckoo to dynamically analyze malware samples and Bro to monitor network traffic and extract suspicious files. Bro scripts are shown to extract files and submit them to Cuckoo for analysis. The talk emphasizes automating the analysis workflow and correlating indicators from Cuckoo with external threat intelligence in OSSEC to aid detection.