For details on reverse engineering - refer to the Reverse 🔧 section of this website. I will only look into the simple static and dynamic analysis (using tools without running the file and running it- to see where it poos 💩).
This article is about analysing suspicious documents and possible tools to use.