MalDex Collection Log
Track your malmon encounters and build your cybersecurity threat knowledge
Collection Summary
Player Name: ___________________________ Character Role: ___________________
Collection Started: _________________ Total Encounters: _____
Unique Malmons Encountered: _____ Fully Documented: _____
Favorite Malmon Type: _________________________ Most Challenging: _________________________
Malmon Encounter Log
Entry #1
Date: _________ Session: _____ Malmon Name: _____________________
Type(s): ________________________________ Threat Level: __________
Scenario Context: ________________________________________
Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________
Key Characteristics Observed: ________________________________________________________
Real-World Threat: ________________________________________
ATT&CK Techniques: ______________________________________
My Roleβs Contribution: ____________________________________
Community Notes to Add: __________________________________
Entry #2
Date: _________ Session: _____ Malmon Name: _____________________
Type(s): ________________________________ Threat Level: __________
Scenario Context: ________________________________________
Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________
Key Characteristics Observed: ________________________________________________________
Real-World Threat: ________________________________________
ATT&CK Techniques: ______________________________________
My Roleβs Contribution: ____________________________________
Community Notes to Add: __________________________________
Entry #3
Date: _________ Session: _____ Malmon Name: _____________________
Type(s): ________________________________ Threat Level: __________
Scenario Context: ________________________________________
Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________
Key Characteristics Observed: ________________________________________________________
Real-World Threat: ________________________________________
ATT&CK Techniques: ______________________________________
My Roleβs Contribution: ____________________________________
Community Notes to Add: __________________________________
Entry #4
Date: _________ Session: _____ Malmon Name: _____________________
Type(s): ________________________________ Threat Level: __________
Scenario Context: ________________________________________
Discovery Method: - [ ] Alert triggered - [ ] Proactive hunting - [ ] User report - [ ] Network monitoring - [ ] Other: ____________________
Key Characteristics Observed: ________________________________________________________
Real-World Threat: ________________________________________
ATT&CK Techniques: ______________________________________
My Roleβs Contribution: ____________________________________
Community Notes to Add: __________________________________
Type Effectiveness Knowledge
Track what youβve learned about malmon type matchups
Strong Against
My Role Excels vs: - Type: _________________ Why: _________________________ - Type: _________________ Why: _________________________ - Type: _________________ Why: _________________________
Challenging Matchups
My Role Struggles vs: - Type: _________________ Strategy: ____________________ - Type: _________________ Strategy: ____________________ - Type: _________________ Strategy: ____________________
Team Synergies Discovered
Role Combinations That Work Well: ________________________________________________________
Techniques That Complement My Role: ________________________________________________________
Personal MalDex Stats
By Malmon Type
Worms: _____ encountered
Trojans: _____ encountered
Ransomware: _____ encountered
APTs: _____ encountered
Rootkits: _____ encountered
Infostealers: _____ encountered
By Discovery Method
Alerts: _____ | Hunting: _____ | Reports: _____ | Monitoring: _____ | Other: _____
By Threat Level
Beginner: _____ | Intermediate: _____ | Advanced: _____ | Expert: _____
Community Contributions
Documentation Contributions
Date: _________ Malmon: ____________________
What I Added: ______________________________________
Community Feedback: ________________________________
Knowledge Sharing
Date: _________ Topic: ______________________
Shared With: ____________________________________
Knowledge Gained from Others: ____________________
Research Notes
Real-World Connections
Malmon: _________________________ Real Threat: _________________________
Key Insights: ________________________________________________
Malmon: _________________________ Real Threat: _________________________
Key Insights: ________________________________________________
Pattern Recognition
Similar Behaviors Noticed: ________________________________________________________
Attack Progression Patterns: ________________________________________________________
Collection Goals
Next Targets
- Malmon: _________________ Reason: _________________
- Malmon: _________________ Reason: _________________
- Malmon: _________________ Reason: _________________
Skills to Develop
For Better Malmon Analysis: - ________________________________________________ - ________________________________________________ - ________________________________________________
Knowledge Gaps to Fill
Continue tracking on additional sheets or use the digital MalDex system for expanded collection management