What are Yara Rules (and How Cybersecurity Analysts Use Them)