Building a Forensic Timeline

Building a forensic timeline is one of the most important steps in incident investigation. A well-constructed timeline allows investigators to understand what happened, when it happened, and how the attacker moved through the system. Timelines combine evidence from logs, file metadata, memory artifacts, browser data, and system events to form a clear chronological narrative of the intrusion.

This chapter explains the sources of timeline data, how to parse and correlate events, and how forensic analysts reconstruct attacks from scattered artifacts.


What Is a Forensic Timeline?

A forensic timeline is a chronological sequence of events collected from digital evidence.
It shows:

  • User actions

  • Malware activity

  • System changes

  • File modifications

  • Network events

  • Authentication attempts

  • Persistence creation

  • Data exfiltration steps

A timeline reveals patterns that individual artifacts cannot.


Goals of Timeline Analysis

  • Reconstruct attacker behavior

  • Understand initial entry point

  • Identify lateral movement

  • Trace file creation/modification

  • Detect persistence and malware execution

  • Correlate logs from different sources

  • Validate or refute hypotheses

  • Establish legal evidence sequence


Sources of Timeline Evidence

Forensic timelines rely on many independent data points across the system.


1. File System Timestamps

MAC times (Modified, Accessed, Created):

  • NTFS: Created, Modified, Accessed, Entry Modified

  • EXT4/APFS: Varies by system

  • Evidence of file creation, execution, deletion, staging

Tools:

  • FTK Imager

  • Autopsy

  • Sleuth Kit (mactime)


2. System Logs

Logs provide timestamped records of system activity.

Windows:

  • Security logs

  • Event logs (4624 logon, 4688 process creation)

  • PowerShell logs

  • Sysmon events

Linux:

  • /var/log/auth.log

  • /var/log/syslog

  • Systemd journal

macOS:

  • Unified logs

  • TCC database

  • LaunchServices

Logs reveal authentication attempts, command execution, crashes, privilege escalation, and system failures.


3. Memory Artifacts

Memory dumps contain:

  • Running processes

  • Network connections

  • Injection timestamps

  • Process start times

  • Malicious threads

  • Command-line history

Memory provides “snapshot moments” vital for timeline gaps.


4. Browser & Application Artifacts

Sources include:

  • Browser history & cache

  • Downloads

  • Cookie timestamps

  • Cloud sync activity

  • Messaging timestamps

Useful for phishing, credential theft, and user activity reconstruction.


5. Persistence Indicators

Timeline entries include:

  • Creation of scheduled tasks

  • New services installed

  • Registry run keys created

  • New cron files

  • LaunchAgents added

These show how and when persistence was established.


6. Network Logs

Network data reveals:

  • Connections to C2 servers

  • DNS requests

  • Beacon intervals

  • Exfiltration events

  • Remote login attempts

Pairing network timestamps with host activity exposes attacker movements.


7. External Logs (Cloud / Firewall / SIEM)

Cloud (AWS, Azure, GCP):

  • API calls

  • IAM changes

  • Login events

Firewall / IDS:

  • Blocked connections

  • Traffic anomalies

These extend the event chain beyond the endpoint.


How to Build a Forensic Timeline


Step 1: Collect Timestamped Events

Gather all available timestamps from:

  • File metadata

  • Event logs

  • Memory analysis

  • Browser data

  • Registry keys

  • Network packets

  • Application logs

Merge everything into a single dataset.


Step 2: Normalize Timestamps

Different sources use:

  • UTC

  • Local time

  • Epoch time

  • UNIX timestamps

  • FILETIME (Windows)

Normalize all timestamps into one standard (e.g., UTC).


Step 3: Correlate Events

Look for event relationships:

  • Process creation → registry modification → network connection

  • File creation → execution → deletion

  • Login event → lateral movement → privilege escalation

Correlation exposes attacker patterns.


Step 4: Identify Anomalies

Examples:

  • Logons at unusual times

  • Rapid creation of multiple files

  • Execution of unsigned binaries

  • Connections to rare foreign IPs

  • Processes launching outside normal working hours

Anomalies point directly to malicious behavior.


Step 5: Reconstruct the Attack Chain

Typical timeline sequences:

Initial Access

Phishing email → malicious document → payload drop

Execution

User opens file → process spawns → injector loads DLL

Persistence

Service created → registry key added → cron job installed

Lateral Movement

New credentials → remote login → file transfer

Exfiltration

DNS tunnels → HTTP POST → cloud storage uploads

Cleanup

Log clearing → file deletion → timestamp manipulation

A full timeline provides the complete narrative.


Tools Used for Timeline Analysis

Sleuth Kit & Autopsy

  • mactime

  • l2t_csv.py

log2timeline (Plaso)

  • Unified timeline creator

  • Parses thousands of artifact types

Timesketch

  • Powerful web UI for timeline visualization

  • Collaboration and tagging

Elastic / Splunk

  • Great for ingesting large event volumes

Memory Forensics (Volatility)

  • Process start times

  • Network artifacts


Timeline Analysis Best Practices

  • Always convert timestamps to the same time zone

  • Maintain an evidence worksheet

  • Mark events as benign, suspicious, or malicious

  • Validate every assumption using multiple artifacts

  • Watch for timestamp tampering

  • Correlate logs with memory artifacts

  • Include both user and system activity

  • Create multiple timeline layers (host, network, cloud)


Intel Dump

  • A forensic timeline is a chronological reconstruction of events from logs, file system metadata, memory artifacts, network traffic, and cloud/system activity.

  • Sources include MAC times, Windows event logs, syslogs, browser data, persistence artifacts, memory processes, network logs, and cloud audit records.

  • Building a timeline requires collecting timestamps, normalizing them to a single format, correlating related events, and identifying anomalies.

  • Tools such as Sleuth Kit, Plaso, Timesketch, Volatility, Elastic, and Autopsy help generate timelines across large datasets.

  • A well-built timeline reveals initial access, execution, persistence, lateral movement, privilege escalation, exfiltration, and cleanup stages of an attack.

HOME COMMUNITY CAREERS DASHBOARD