Building an incident timeline is one of the most important steps in digital forensics and incident response. A timeline visualizes the attacker’s actions, the system’s behavior, and the victim’s activity in chronological order. This helps investigators understand how the compromise started, how the attacker moved, what data was accessed, and where to focus remediation.
Why Incident Timelines Matter
A well-built timeline reveals:
-
Initial access
-
Privilege escalation
-
Persistence mechanisms
-
Lateral movement
-
Data staging or exfiltration
-
Malware execution
-
Cleanup attempts
-
Command sequences
Timelines turn scattered logs into a coherent narrative of the attack.
Sources of Evidence Used for Timeline Creation
Timelines are created by combining many different artifacts.
System & OS Logs
Examples:
-
Windows Event Logs
-
Linux auth logs
-
macOS Unified Logs
-
Sysmon
Useful for:
-
Logon activity
-
Process creation
-
Service manipulation
Disk Artifacts
From:
-
Master File Table (MFT)
-
Registry hives
-
LNK files
-
Jump Lists
-
Browser artifacts
-
Prefetch files
These show:
-
Program executions
-
File access patterns
-
User behavior
Network Evidence
Includes:
-
DNS logs
-
Firewall logs
-
Proxy logs
-
PCAP captures
-
IDS/IPS alerts
Shows:
-
C2 connections
-
Beaconing
-
Exfiltration
-
Lateral movement
Memory Evidence
From:
-
Volatility
-
Rekall
-
EDR memory dumps
Shows:
-
Injected code
-
Active malware
-
Unlinked processes
Cloud Logs
Such as:
-
AWS CloudTrail
-
Azure Activity Logs
-
GCP Audit Logs
Shows:
-
IAM changes
-
API misuse
-
Storage access
Application Logs
From:
-
Web servers
-
Databases
-
VPN systems
-
Email servers
Shows:
-
Failed login attempts
-
Suspicious uploads
-
SQL injection indicators
Steps to Build an Incident Timeline
1. Collect All Relevant Evidence
Gather logs and artifacts from:
-
Endpoints
-
Servers
-
Network devices
-
Cloud services
-
Memory images
-
Disk images
Avoid modifying evidence and maintain chain of custody.
2. Normalize Log Formats
Different evidence formats must be converted into a unified structure:
-
Timestamp
-
Event description
-
Source system
-
User or process
-
IP addresses
-
Additional metadata
Tools like Plaso, Timesketch, KAPE, and ELK help normalize data.
3. Convert Artifacts into Time-Based Records
Examples:
-
Extract MAC times from file systems
-
Parse registry last-write timestamps
-
Convert EVTX logs to CSV
-
Extract Sysmon event timestamps
-
Map DNS query times
Every record gets a timeline entry.
4. Merge Events Chronologically
Sort all events by timestamp:
-
Oldest → newest
-
Or phase-based ordering
Merging exposes attacker activity hidden across multiple systems.
5. Identify Key Moments in the Attack
Mark important events such as:
-
Initial compromise
-
First execution
-
Privilege escalation
-
Credential access
-
Lateral movement
-
Persistence installation
-
Data collection
-
Exfiltration
-
Cleanup or log deletion
These form the backbone of the timeline.
6. Correlate Across Multiple Sources
Correlation reveals:
-
Same user logging into different machines
-
Same IP interacting with multiple services
-
Malware process spawning child processes
-
A change in IAM followed by suspicious API calls
Cross-source correlation confirms the attacker’s path.
7. Visualize the Timeline
Use tools like:
-
Timesketch
-
Kibana
-
Excel
-
Plaso output
-
ELK dashboards
-
Maltego event chains
Visualization makes patterns obvious.
8. Validate and Refine the Timeline
Check for:
-
Gaps
-
Time skew
-
Missing logs
-
Duplicate entries
-
Incorrect timezone handling
Timestamps must be normalized to a single timezone.
9. Create a Narrative Summary
Write a concise narrative describing:
-
How the attacker entered
-
What they did at each stage
-
What data was affected
-
When the attack was discovered
-
How the system responded
This narrative is included in the final incident report.
Common Timeline Indicators to Look For
-
Repeated authentication failures
-
New user accounts or role changes
-
Suspicious process creation
-
Remote connections at odd hours
-
Sudden file encryption
-
Large volumes of file reads
-
DNS queries to unusual domains
-
Disabled security tools
-
Deleted logs
These signal malicious activity.
Tools for Building Incident Timelines
Plaso / log2timeline
Combines multiple evidence sources into a unified timeline.
Timesketch
Searchable, collaborative timeline analysis.
ELK Stack
Large-scale timeline and log analytics.
KAPE
Creates triage timelines from Windows systems.
Autopsy / The Sleuth Kit
Builds bodyfile timelines from disk images.
Excel / CSV Analysis
Simple but effective for manual timeline work.
Intel Dump
-
Incident timelines merge data from OS logs, disk artifacts, network captures, memory images, cloud logs, and application logs.
-
Steps include collecting evidence, normalizing formats, extracting time-based events, sorting chronologically, correlating across sources, and visualizing the final sequence.
-
Key events include initial access, execution, persistence, privilege escalation, lateral movement, staging, exfiltration, and cleanup.
-
Tools like Plaso, Timesketch, ELK, KAPE, and Autopsy help automate and visualize timeline creation.