Quick Reference Guide

Session Structure At-a-Glance

Character Creation

  1. Skills Discovery: Share cybersecurity experience with team
  2. Role Assignment: Collaborative selection based on interests
  3. Character Development: Build personality around chosen role

Round 1: Discovery Phase

  • Objective: Identify the specific Malmon
  • Individual Investigation: Each role explores from their perspective
  • Knowledge Sharing: Team connects clues and builds understanding
  • Malmon Identification: Determine threat type and characteristics

Round 2: Investigation Phase

  • Objective: Understand attack scope and impact
  • Impact Assessment: What systems/data are affected?
  • Attack Vector Analysis: How did it succeed?
  • Evolution Assessment: Risk of threat escalation

Round 3: Response Phase

  • Objective: Coordinate effective containment
  • Strategy Development: Choose approaches based on Malmon type
  • Implementation: Execute coordinated response
  • Resolution: Outcome and lessons learned

Role Quick Reference

🔍 Detective (Cyber Sleuth)

Focus: Finding clues and analyzing evidence
Typical Actions:

  • Analyze system logs and digital artifacts
  • Interview users about suspicious activities
  • Examine file signatures and process behaviors
  • Build attack timelines and evidence chains

Team Contributions:

  • Pattern recognition and anomaly detection
  • Forensic evidence collection and analysis
  • Timeline construction and attack progression
  • Connecting disparate clues into coherent picture

🛡️ Protector (Digital Guardian)

Focus: Stopping threats and securing systems
Typical Actions:

  • Implement security controls and containment measures
  • Isolate infected systems from network
  • Deploy backup and recovery procedures
  • Harden systems against further attacks

Team Contributions:

  • Technical containment implementation
  • System damage assessment and recovery
  • Security control deployment and configuration
  • Immediate threat mitigation

📡 Tracker (Data Whisperer)

Focus: Monitoring data flows and network behavior
Typical Actions:

  • Monitor network traffic for anomalies
  • Trace data exfiltration and communication paths
  • Identify lateral movement through networks
  • Block malicious communications

Team Contributions:

  • Network behavior analysis
  • Data flow monitoring and protection
  • Communication pattern recognition
  • Network-based containment validation

👥 Communicator (People Whisperer)

Focus: Stakeholder management and coordination
Typical Actions:

  • Interview users about attack vectors
  • Coordinate with management and external parties
  • Assess business impact and compliance requirements
  • Manage crisis communication

Team Contributions:

  • Stakeholder coordination and communication
  • Business impact assessment
  • Regulatory and compliance considerations
  • User education and awareness

⚡ Crisis Manager (Chaos Wrangler)

Focus: Overall incident coordination and strategy
Typical Actions:

  • Coordinate team activities and resource allocation
  • Set priorities and manage timeline
  • Interface with senior leadership
  • Plan recovery and business continuity

Team Contributions:

  • Strategic coordination and planning
  • Resource allocation and priority setting
  • Cross-functional team integration
  • Timeline and dependency management

🎯 Threat Hunter (Pattern Seeker)

Focus: Proactive threat discovery and intelligence
Typical Actions:

  • Search for hidden threats and persistence mechanisms
  • Investigate potential related attacks
  • Develop threat intelligence and attribution
  • Validate security control effectiveness

Team Contributions:

  • Proactive threat discovery
  • Advanced threat analysis and attribution
  • Intelligence development and sharing
  • Security control validation and testing

Type Effectiveness Chart

Malmon Type Super Effective Against Weak To Common Examples
Trojan Defense systems Detection/Behavioral analysis GaboonGrabber, FakeBat
Worm Networks Isolation/Segmentation WannaCry, Code Red, Raspberry Robin
Ransomware Data Backup systems LockBit, WannaCry (hybrid)
Rootkit System integrity Forensic analysis Advanced persistence mechanisms
APT Time/Patience Intelligence/Threat hunting Stuxnet, Noodle RAT, Gh0st RAT
Infostealer Privacy Encryption/Access controls Noodle RAT, PoisonIvy

Security Control Effectiveness

Control Type Super Effective vs Normal vs Not Effective vs
Signature Detection Basic Trojans, Known Worms Most standard threats Zero-days, Polymorphic
Network Isolation Worms, Network propagation APTs, Infostealers Air-gap jumping
Backup Systems Ransomware, Data encryption Most persistent threats Data theft (post-exfiltration)
Behavioral Analysis Trojans, APTs, Evasive threats Standard attacks Perfect mimicry
Threat Intelligence APTs, Nation-state Organized cybercrime Novel/amateur threats
Forensic Analysis Rootkits, System modifications Advanced threats Fast-moving Worms

Action System

Actions Per Round

  • Each player: 2 actions per round
  • Action types: Investigation, Communication, Technical, Strategic

Dice Mechanics

  • Easy tasks (8+): Standard procedures with appropriate expertise (~85% success)
  • Medium tasks (12+): Complex analysis requiring expertise (~60% success)
  • Hard tasks (16+): Cutting-edge techniques or high stakes (~35% success)
  • Automatic Success: Clear expertise + appropriate approach

Collaboration Bonuses

  • Direct Support (+2): Actions that directly enable teammate efforts
  • Team Coordination (+3): Multiple players working on unified objective
  • Perfect Teamwork (Auto-Success): Excellent coordination + real expertise

Type Effectiveness Modifiers

  • Super Effective (+3): Using optimal approaches against Malmon weaknesses
  • Normal (0): Standard effectiveness
  • Not Effective (-2): Poor match between approach and threat type

Network Security Status

Status Levels

  • Secure (90-100): Minimal impact, normal operations continue
  • Concerned (75-89): Active threat but manageable response
  • Critical (50-74): Significant impact requiring major response
  • Compromised (25-49): Severe impact affecting business operations
  • Crisis (0-24): Organization-threatening incident

Status Changes

Decreases:

  • Malmon evolution (-10 to -20)
  • Data theft (-5 to -15)
  • Failed containment (-3 to -8)

Increases:

  • Successful containment (+10 to +20)
  • Early detection (+5 to +10)
  • Team coordination (+3 to +8)

Common Malmon Abilities

Universal Abilities

  • Perfect Mimicry: Appears identical to legitimate software
  • Rapid Propagation: Spreads quickly through vulnerabilities
  • Deep Persistence: Maintains access through restarts
  • Behavioral Camouflage: Blends with normal activity
  • Fileless Deployment: Operates entirely in memory
  • Multi-Payload Delivery: Deploys additional threats
  • Zero-Day Arsenal: Uses unknown vulnerabilities
  • Command Center Coordination: Controls other malware

Evolution Triggers

  • Time Pressure: Taking too long in any phase
  • Failed Containment: Unsuccessful response attempts
  • Environmental Opportunity: Network vulnerabilities or gaps
  • External Communication: Contact with threat actor infrastructure

Emergency Phrases for Teams

When Stuck

  • “What would we try if we had unlimited resources?”
  • “What’s our gut instinct about this situation?”
  • “What would this look like from [different role] perspective?”
  • “What’s the worst-case scenario if we’re wrong?”

For Coordination

  • “How do our findings connect together?”
  • “What’s our priority - speed or thoroughness?”
  • “Who has experience with this type of situation?”
  • “What could go wrong with this approach?”

For Learning

  • “What surprised us about this Malmon’s behavior?”
  • “Which techniques worked better than expected?”
  • “What would we do differently next time?”
  • “What can we share with other teams?”

Session Troubleshooting

If One Person Dominates

  • Redirect: “That’s helpful - let’s hear other perspectives”
  • Build on input: “Can someone add to what [Name] shared?”
  • Role-specific questions: “What questions would [Role] ask about this?”

If Energy Drops

  • Raise stakes: “What’s the worst-case scenario here?”
  • Create urgency: “What happens if we’re too slow?”
  • Personal investment: “Who would be affected if this succeeds?”

If Team Gets Too Technical

  • Broader perspective: “How does this connect to our overall objective?”
  • Role diversity: “What would worry the Communicator about this approach?”
  • Time management: “We have X minutes - what’s our priority?”

If Confused About Mechanics

  • Focus on story: “What would realistically happen in this situation?”
  • Use expertise: “Based on your experience, what makes sense here?”
  • Collaborative decision: “What does the team think is most logical?”

Character Development Prompts

For All Roles

  • What’s your character’s biggest professional fear?
  • How long have you worked in cybersecurity?
  • What motivates you to protect this organization?
  • What’s one quirk about how you approach problems?

Role-Specific Prompts

Detective: “What pattern or detail do others always miss?”
Protector: “What system do you consider ‘your baby’?”
Tracker: “How do you visualize network traffic in your mind?”
Communicator: “What’s your go-to analogy for explaining cybersecurity?”
Crisis Manager: “How do you organize chaos in your head?”
Threat Hunter: “What assumption do you always question first?”


Post-Session Reflection Questions

For Individuals

  • What’s one thing that surprised you during this session?
  • Which role perspective taught you something new?
  • What technique or approach could you use in real work?
  • How did your character’s perspective shape your decisions?

For Teams

  • What was our most effective moment of coordination?
  • Which discovery or insight was most valuable?
  • What would we do differently if we faced this Malmon again?
  • How can we apply these lessons to our actual work?

For MalDex Documentation

  • What surprised us most about this Malmon’s behavior?
  • Which response techniques worked better than expected?
  • What insights could help other teams facing similar threats?
  • What key lesson should other teams know about this experience?