This cheat sheet outlines tips and tools for analyzing malicious documents, such as Microsoft Office, RTF, and PDF files. To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. General Approach to Document AnalysisExamine the document for anomalies, such as risky tags, scripts, and embedded artifacts.Locate embedded code, such as shellcode,