Dwell Time
It's 3 AM. You're a Tier-1 SOC analyst on your first night shift. The SIEM is loud, your boss is louder, and somewhere in the network, an attacker is already inside.
Marcus from the day shift has your back on the chat. He knows the systems, knows the playbook, and has seen everything you're about to see — twice.
What you'll do
- Triage 30 real-world SOC alerts across three night shifts. Every alert is a real MITRE ATT&CK technique pulled from real incidents — encoded PowerShell, lolbins, lateral movement, credential dumping, the whole catalog.
- Make four decisions per alert: ALLOW, BLOCK, ESCALATE, or INVESTIGATE further (which costs you time but reveals hidden fields).
- Listen to your mentor. Marcus chats you through the first night and gradually pulls back. He's funny, he's kind, he knows the systems better than anyone.
- Read the corporate cringe when you over-block. Yes, the marketing team will email you. No, the CEO does not appreciate you blocking his "totally legitimate side project" in PowerShell.
Three endings — one playthrough
How early you spot the truth determines how the night ends. Some players catch on by alert #3. Some catch on by night three. Some never catch on, and that's when things get… interesting.
After the ending, a review screen walks you through every decision you made — your action vs. the correct action, with MITRE technique references and explanations. So whether or not you noticed, you'll learn.
Made for
- SOC analysts who want to laugh at their own profession
- Anyone curious what cybersecurity work actually looks like on the inside
- Players of Papers Please, Orwell, Hacknet, or any thinking-genre game
- Anyone who likes story-driven puzzle horror with three layers of misdirection
Real techniques, real references
Built around MITRE ATT&CK, with detection logic inspired by Sigma rules and attack patterns from Atomic Red Team. Process names, command-line flags, and Windows / Sysmon Event IDs are drawn from real incident reports. (IOC values are mocked — no actual malicious data is used.)
This is a game, not professional training. But you might learn something anyway.
Controls
- Mouse: click decision buttons, click chat, click anywhere to dismiss popups
- Keyboard (optional):
A/B/E/Ifor the four actions,Enterto advance - Browser: works in any modern browser. Best on desktop / laptop. Sound recommended — Marcus types, the SIEM beeps, and night three has something you'll want to hear.
How long is a session?
About 10–15 minutes for one full playthrough. Maybe 25 if you investigate everything. You'll probably want to play it twice.
A note on accuracy
If you're in InfoSec and you spot something I got wrong — please tell me in the comments. The point is to be authentic, and I'd rather fix a flag value than have a SOC analyst roll their eyes at it.
Disclaimer
This is a work of fiction. All organizations, employees, incidents, and CEOs in kimonos depicted are fabricated. Any resemblance to real breaches is depressingly likely.
"He was already inside."
| Updated | 1 day ago |
| Published | 18 days ago |
| Status | Released |
| Platforms | HTML5 |
| Release date | 18 days ago |
| Rating | Rated 5.0 out of 5 stars (1 total ratings) |
| Author | sucky_charm |
| Genre | Simulation, Educational |
| Tags | cybersecurity, Hacking, mitre, Multiple Endings, Narrative, soc-simulator, Story Rich, terminal, Working Simulator |
| Average session | A few minutes |
| Languages | English |
| Inputs | Keyboard, Mouse, Touchscreen |
| AI Disclosure | AI Assisted, Code |
Development log
- Dwell Time Release!!18 days ago




Leave a comment
Log in with itch.io to leave a comment.