Attack example

I am running Bro0.7a73 system in a single machine and preparing to carry out
some experiments.Who can explain the attack examples included in the Bro
packet?

BTW, are there some help documents available for Tcpdump and Bro? I mean
some fundemental aspects.

Thanks a lot.

-Wei Li