MalDex Collection Log

Track your malmon encounters and build your cybersecurity threat knowledge


Collection Summary

Player Name: ___________________________ Character Role: ___________________

Collection Started: _________________ Total Encounters: _____

Unique Malmons Encountered: _____ Fully Documented: _____

Favorite Malmon Type: _________________________ Most Challenging: _________________________


Malmon Encounter Log

Entry #1

Date: _________ Session: _____ Malmon Name: _____________________

Type(s): ________________________________ Threat Level: __________

Scenario Context: ________________________________________


Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________

Key Characteristics Observed: ________________________________________________________


Real-World Threat: ________________________________________

ATT&CK Techniques: ______________________________________

My Role’s Contribution: ____________________________________


Community Notes to Add: __________________________________



Entry #2

Date: _________ Session: _____ Malmon Name: _____________________

Type(s): ________________________________ Threat Level: __________

Scenario Context: ________________________________________


Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________

Key Characteristics Observed: ________________________________________________________


Real-World Threat: ________________________________________

ATT&CK Techniques: ______________________________________

My Role’s Contribution: ____________________________________


Community Notes to Add: __________________________________



Entry #3

Date: _________ Session: _____ Malmon Name: _____________________

Type(s): ________________________________ Threat Level: __________

Scenario Context: ________________________________________


Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________

Key Characteristics Observed: ________________________________________________________


Real-World Threat: ________________________________________

ATT&CK Techniques: ______________________________________

My Role’s Contribution: ____________________________________


Community Notes to Add: __________________________________



Entry #4

Date: _________ Session: _____ Malmon Name: _____________________

Type(s): ________________________________ Threat Level: __________

Scenario Context: ________________________________________


Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________

Key Characteristics Observed: ________________________________________________________


Real-World Threat: ________________________________________

ATT&CK Techniques: ______________________________________

My Role’s Contribution: ____________________________________


Community Notes to Add: __________________________________



Type Effectiveness Knowledge

Track what you’ve learned about malmon type matchups

Strong Against

My Role Excels vs: - Type: _________________ Why: _________________________ - Type: _________________ Why: _________________________ - Type: _________________ Why: _________________________

Challenging Matchups

My Role Struggles vs: - Type: _________________ Strategy: ____________________ - Type: _________________ Strategy: ____________________ - Type: _________________ Strategy: ____________________

Team Synergies Discovered

Role Combinations That Work Well: ________________________________________________________


Techniques That Complement My Role: ________________________________________________________



Personal MalDex Stats

By Malmon Type

Worms: _____ encountered
Trojans: _____ encountered
Ransomware: _____ encountered
APTs: _____ encountered
Rootkits: _____ encountered
Infostealers: _____ encountered

By Discovery Method

Alerts: _____ | Hunting: _____ | Reports: _____ | Monitoring: _____ | Other: _____

By Threat Level

Beginner: _____ | Intermediate: _____ | Advanced: _____ | Expert: _____


Community Contributions

Documentation Contributions

Date: _________ Malmon: ____________________

What I Added: ______________________________________


Community Feedback: ________________________________

Knowledge Sharing

Date: _________ Topic: ______________________

Shared With: ____________________________________

Knowledge Gained from Others: ____________________



Research Notes

Real-World Connections

Malmon: _________________________ Real Threat: _________________________

Key Insights: ________________________________________________


Malmon: _________________________ Real Threat: _________________________

Key Insights: ________________________________________________


Pattern Recognition

Similar Behaviors Noticed: ________________________________________________________


Attack Progression Patterns: ________________________________________________________



Collection Goals

Next Targets

  1. Malmon: _________________ Reason: _________________
  2. Malmon: _________________ Reason: _________________
  3. Malmon: _________________ Reason: _________________

Skills to Develop

For Better Malmon Analysis: - ________________________________________________ - ________________________________________________ - ________________________________________________

Knowledge Gaps to Fill





Continue tracking on additional sheets or use the digital MalDex system for expanded collection management