Skip to content

A high-speed forensic timeline engine for Windows forensic artifacts built for DFIR investigators. Quickly consolidate CSV output from processed triage evidence for Eric Zimmerman (EZ Tools) Kape, Axiom, Hayabusa, Chainsaw and Nirsoft into a unified timeline.

License

Notifications You must be signed in to change notification settings

acquiredsecurity/forensic-timeliner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

49 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

A high-speed forensic processing engine built for DFIR investigators. Quickly consolidate CSV output from top-tier triage tools into a unified mini timeline with built-in filtering, artifact detection, date filtering, keyword tagging, and deduplication.

Version Downloads Stars Contributors Maintained CodeFactor C# .NET 9


Release

๐Ÿš€ What's New in v2.011.0 โ€“ Forensic Timeliner

This release introduces major enhancements to filtering, timestamp support for MFT, and configuration flexibility while maintaining full compatibility with Timeline Explorer. It focuses on improving visibility, usability, and control over how forensic artifacts are ingested and parsed.

๐Ÿ”ง Highlights in v2.011.0 New ignore_filters Toggle Per-artifact YAML option to bypass all extension/path or event ID/provider filters FOR MFT and Event Logs, providing full MFT & Event Log ingestion when needed.

Multi-Timestamp Support for MFT Added multiple MFT timestamps per entry (e.g. Created0x10, LastModified0x10, etc.)

Dynamic Timeline Descriptions MFT shows multi-timestamp artifacts with enriched timestamp descriptions (e.g., MFT - Created, MFT - Accessed) for improved filtering and readability.

  • Bugs Registry Value Fixed an issue with registry ValueName not being added to lines

Table of Contents


Main Features

-Combine csv output from

  • EZ Tools / Kape

  • Axiom

  • Chainsaw

  • Hayabusa

  • Nirsoft

  • output data into a unified timeline

  • Automatic CSV discovery from triage directories (all configurable) with YAML

    • Yaml files already use default namings for tools with default output
    • For tools like Hayabusa where you can set the file output name you should name the file some variaition of Hayabusa.csv and put it in a folder named Hayabusa
    • Simply provide the base directory of where the triage output lives and the tool will attempt to discover the csv files based on
    • File Name
    • Folder Name
    • File Headers
    • For Event Logs Channel\Provider Filters
    • For MFT File Extension and Path Filters
  • Timeline enrichment with with keyword tagging for use with Timeline Explorer. Automatically create a TLE session file based on keyword searching for CSV output.

  • RFC-4180-compliant export for compatibility with tools like Timeline Explorer

  • Date filtering and deduplication controls

  • Interactive Setup and Yaml Discovery Preview


Quick Start

TL;DR! Get some Kape/EZ Forensic Output

Download the exe and run:

ForensicTimeliner.exe --Interactive
ForensicTimeliner.exe --BaseDir C:\triage\hostname --ALL --OutputFile C:\timeline.csv
.\ForensicTimeliner.exe --ProcessEZ --BaseDir "C:\Users\admin0x\Desktop\sample_data\host_t800" --OutputFile "C:\Users\admin0x\Desktop\test" --ExportFormat csv --EnableTagger
  • Open TLE Session file from your output directory. If you move the file you need to updste the session file path.

  • Use default naming for your csv files and make sure they are inside the base directory you set. There is a fallback to auto discover csv files based on file headers, or adjust the filename in the YAML settings.

  • Use the --EnableTagger feature view command line to build a Timeline Explorer session file based on keyword tagging. Adjust keywords in config\keywords\keywords.yaml


Downloads

Latest Release: v2.011

Download sample data for testing purposes here.

Sample Data


Screenshots

Interactive Menu

image

Timeline Explorer Support image

  • Auto coloring applied in TLE with latest plugin files
  • Automatically Build a TLE Session File with tagged rows based on keywords
    • Edit the Keywords config file and add your keywords
    • Run ForensicTimeliner.exe from the command line using the --EnableTagger flag

Command Line Arguments

Argument Type Default Description
--BaseDir string C:\triage Root directory to recursively search for supported artifact CSVs
--OutputFile string "timeline.csv" Output file or folder for exported timeline
--ExportFormat string csv Export format: csv, json, or jsonl
--StartDate datetime null Filter: only include rows after this date
--EndDate datetime null Filter: only include rows before this date
--Deduplicate / -d bool false Remove duplicate timeline rows after export
--EnableTagger bool false Enables keyword-based tagging via config/keywords/keywords.yaml
--IncludeRawData bool false Adds a RawData column for unmodified source row contents (if available) experimental
--NoBanner bool false Skip printing the banner/logo at start
--Help / -h bool false Show help and usage information
--ALL / -a bool false Process all tools listed below (based on discovery)
--Interactive / -i bool false Launch an interactive CLI to build a custom command
--ProcessEZ bool false Enable EZ Tools artifact parsing
--ProcessAxiom bool false Enable Axiom artifact parsing
--ProcessChainsaw bool false Enable Chainsaw artifact parsing
--ProcessHayabusa bool false Enable Hayabusa artifact parsing
--ProcessNirsoft bool false Enable Nirsoft artifact parsing

Timeline Output Field Structure

๐Ÿงพ Timeline Output Field Structure All output is exported as RFC-4180-compliant CSV and ready for review in Timeline Explorer, Excel, or other forensic tools.

Each timeline entry includes the following fields:

DateTime,TimestampInfo,ArtifactName,Tool,Description,DataDetails,DataPath,FileExtension,EventId,User,Computer,FileSize,IPAddress,SourceAddress,DestinationAddress,SHA1,Count,EvidencePath

YAML Config

Timeline parsers can be customized using per-artifact YAML definitions. These control:

  • Artifact discovery (filename_patterns, foldername_patterns, etc.)
  • Filtering (event_channel_filters, provider_filters, paths, extensions)
  • Timestamp mapping (timestamp_fields) ** MFT Only
  • Optional overrides (ignore_filters) ** MFT & Event Logs
    • Set ignore_filters: true to skip all filters for MFT and Event Logs.

Event Log Filters Define EventChannelFilters per channel in your YAML configuration like so:

Event Log Filters

Define EventChannelFilters per channel in your YAML configuration like so:

event_channel_filters:
  Application: [1000, 1001]
  Microsoft-Windows-PowerShell/Operational: [4100, 4103, 4104]
  Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational: [72, 98, 104, 131, 140]
  Microsoft-Windows-TerminalServices-LocalSessionManager/Operational: [21, 22]
  Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational: [261, 1149]
  Microsoft-Windows-TaskScheduler/Operational: [106, 140, 141, 129, 200, 201]
  Microsoft-Windows-WinRM/Operational: [169]
  SentinelOne/Operational: [1, 31, 55, 57, 67, 68, 77, 81, 93, 97, 100, 101, 104, 110]
  Security: [1102, 4624, 4625, 4648, 4698, 4702, 4720, 4722, 4723, 4724, 4725, 4726, 4732, 4756]
  System: [7045]

provider_filters:
    edgeupdate: [0]
    SentinelHelperService: [0]
    brave: [0]
    Edge: [256]
    SentinelOne: [1, 31, 55, 57, 67, 68, 77, 81] 

MFT Processing and Filtering MFT parsing includes automatic timestamp normalization and extension/path filtering.

By default, only Created0x10 timestamps are included to focus on file creation events and limit the overall timeline size

Default filters:

DEFAULT_EXTENSIONS = [".identifier", ".exe", ".ps1", ".zip", ".rar", ".7z"]
DEFAULT_PATHS = ["Users"]

Artifact and Output Support Table

Artifact Supported Tool(s) Example Filename(s)
Amcache EZ Tools, Axiom UnAssociatedFileEntries.csv, AssociatedFileEntries.csv, AmCache File Entries.csv
AppCompatCache EZ Tools, Axiom AppCompatCache.csv, Shim Cache.csv
AutoRuns Axiom Autorun Items.csv
Chrome History Axiom Chrome Web History.csv
Deleted Files EZ Tools RBCmd_Output.csv
Edge History Axiom Edge Web Visits.csv, Edge Web History.csv
Event Logs EZ Tools, Axiom _EvtxECmd_Output.csv, Windows Event Logs.csv
Firefox History Axiom Firefox Web Visits.csv
IE History Axiom Edge-Internet Explorer 10-11 Main History.csv
JumpLists EZ Tools, Axiom AutomaticDestinations.csv, Jump Lists.csv
LNK Files EZ Tools, Axiom _LECmd_Output.csv, LNK Files.csv
MFT EZ Tools, Chainsaw MFTECmd$MFT_Output.csv, mft.csv
MRU Folder Access Axiom MRU Folder Access.csv
MRU Opened/Saved Files Axiom MRU Opened-Saved Files.csv
MRU Recent Files & Folders Axiom MRU Recent Files & Folders.csv
Opera History Axiom Opera Web Visits.csv
Persistence Chainsaw persistence.csv
Prefetch EZ Tools, Axiom _PECmd_Output.csv, Prefetch Files - Windows 8-10-11.csv
PowerShell Execution Chainsaw powershell.csv, powershell_script.csv
RDP Events Chainsaw rdp_events.csv
Recycle Bin Axiom Recycle Bin.csv
Registry EZ Tools _RECmd_Batch_Kroll_Batch_Output.csv
Service Installation Chainsaw service_installation.csv
Service Tampering Chainsaw service_tampering.csv
Shellbags EZ Tools, Axiom _UsrClass.csv, Shellbags.csv
Sigma Rule Matches Chainsaw sigma.csv
UserAssist EZ Tools, Axiom UserAssist.csv
TypedUrls EZ Tools *__TypedURLS__NTUSER.CSV
Threat Events (Chainsaw) Chainsaw account_tampering.csv, defense_evasion.csv, credential_access.csv
Web Browsing History Nirsoft, Axiom WebResults.csv, Chrome/Firefox/Edge History.csv
VPN / RAS Logs Chainsaw microsoft_rasvpn_events.csv, microsoft_rds_events.csv
Login Attacks Chainsaw login_attacks.csv
Log Tampering Chainsaw log_tampering.csv
Antivirus Detections Chainsaw antivirus.csv
Applocker Events Chainsaw applocker.csv
Indicator Removal Chainsaw indicator_removal.csv
Lateral Movement Chainsaw lateral_movement.csv

License

MIT License


About

A high-speed forensic timeline engine for Windows forensic artifacts built for DFIR investigators. Quickly consolidate CSV output from processed triage evidence for Eric Zimmerman (EZ Tools) Kape, Axiom, Hayabusa, Chainsaw and Nirsoft into a unified timeline.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages