CG
SkillsBuilding Incident Timeline with Timesketch
Start Free
Back to Skills Library
Incident Response🟡 Intermediate

Building Incident Timeline with Timesketch

Build collaborative forensic incident timelines using Timesketch to ingest, normalize, and analyze multi-source event data for attack chain reconstruction and investigation documentation.

4 min read12 code examples

Building Incident Timeline with Timesketch

Overview

Timesketch is an open-source collaborative forensic timeline analysis tool developed by Google that enables security teams to visualize and analyze chronological data from multiple sources during incident investigations. It ingests logs and artifacts from endpoints, servers, and cloud services, normalizes them into a unified searchable timeline, and provides powerful analysis capabilities including built-in analyzers, tagging, sketch annotations, and story building. Timesketch integrates with Plaso (log2timeline) for artifact parsing and supports direct CSV/JSONL ingestion for rapid timeline construction during active incidents.

Architecture and Components

Core Components

  • Timesketch Server: Web application with REST API for timeline management
  • OpenSearch/Elasticsearch: Backend storage and search engine for timeline events
  • PostgreSQL: Metadata storage for sketches, stories, and user data
  • Redis: Task queue management for background processing
  • Celery Workers: Asynchronous processing of timeline uploads and analyzers

Data Flow

Evidence Sources --> Plaso/log2timeline --> Plaso storage file (.plaso)
     |                                           |
     v                                           v
  CSV/JSONL --> Timesketch Importer --> OpenSearch Index
                                           |
                                           v
                                    Timesketch Web UI
                                    (Search, Analyze, Story)

Deployment

Docker Deployment (Recommended)

# Clone Timesketch repository
git clone https://github.com/google/timesketch.git
cd timesketch

# Run deployment helper script
cd docker
sudo docker compose up -d

# Default access: https://localhost:443
# Admin credentials generated during first run

System Requirements

  • Minimum 8 GB RAM (16+ GB recommended for large investigations)
  • 4 CPU cores minimum
  • SSD storage for OpenSearch indices
  • Docker and Docker Compose installed

Data Ingestion Methods

Method 1: Plaso Integration (Comprehensive)

# Process disk image with log2timeline
log2timeline.py --storage-file evidence.plaso /path/to/disk/image

# Process Windows event logs
log2timeline.py --parsers winevtx --storage-file windows_events.plaso /path/to/evtx/

# Process multiple evidence sources
log2timeline.py --parsers "winevtx,prefetch,amcache,shimcache,userassist" \
  --storage-file full_analysis.plaso /path/to/mounted/image/

# Import Plaso file into Timesketch
timesketch_importer -s "Case-2025-001" -t "Endpoint-WKS01" evidence.plaso

Method 2: CSV Import (Quick Ingestion)

message,datetime,timestamp_desc,source,hostname
"User login detected","2025-01-15T08:30:00Z","Event Recorded","Security Log","DC01"
"PowerShell execution","2025-01-15T08:31:15Z","Event Recorded","PowerShell","WKS042"
# Import CSV directly
timesketch_importer -s "Case-2025-001" -t "Quick-Triage" events.csv

Method 3: JSONL Import (Structured Data)

{"message": "Suspicious logon from 10.1.2.3", "datetime": "2025-01-15T08:30:00Z", "timestamp_desc": "Event Recorded", "source_short": "Security", "hostname": "DC01"}

Method 4: Sigma Rule Integration

# Upload Sigma rules for automated detection
timesketch_importer --sigma-rules /path/to/sigma/rules/

Analysis Workflow

Step 1: Create Investigation Sketch

1. Log into Timesketch web interface
2. Create new sketch (investigation case)
3. Add relevant timelines to the sketch
4. Set sketch description and tags

Step 2: Run Built-in Analyzers

Timesketch includes analyzers that automatically identify:

  • Browser Search Analyzer: Extracts search queries from browser history
  • Chain of Events Analyzer: Links related events (download -> execute)
  • Domain Analyzer: Extracts and categorizes domain names
  • Feature Extraction Analyzer: Identifies IPs, URLs, hashes
  • Geo Location Analyzer: Maps events to geographic locations
  • Similarity Scorer: Finds similar events across timelines
  • Sigma Analyzer: Matches events against Sigma detection rules
  • Account Finder: Identifies user account activity patterns
  • Tagger: Applies labels based on predefined rules

Step 3: Search and Filter

# Search examples in Timesketch query language

# Find all events related to specific user
source_short:Security AND message:"john.admin"

# Find PowerShell execution events
data_type:"windows:evtx:record" AND event_identifier:4104

# Find lateral movement indicators
source_short:Security AND event_identifier:4624 AND xml_string:"LogonType\">3"

# Find events within specific time range
datetime:[2025-01-15T00:00:00 TO 2025-01-15T23:59:59]

# Find file creation events
data_type:"fs:stat" AND timestamp_desc:"Creation Time"

# Search with tags
tag:"suspicious" OR tag:"lateral_movement"

Step 4: Build Investigation Story

1. Create new story within the sketch
2. Add search views that support each finding
3. Annotate key events with investigator notes
4. Link events to MITRE ATT&CK techniques
5. Document the attack narrative chronologically
6. Export story for inclusion in incident report

Advanced Features

Collaborative Investigation

  • Multiple analysts work on the same sketch simultaneously
  • Comments and annotations persist on events
  • Saved searches shared across the team
  • Investigation stories document findings in context

API Automation

from timesketch_api_client import config
from timesketch_api_client import client as ts_client

# Connect to Timesketch
ts = ts_client.TimesketchApi(
    host_uri="https://timesketch.local",
    username="analyst",
    password="password"
)

# Get sketch
sketch = ts.get_sketch(1)

# Search events
search = sketch.explore(
    query_string='event_identifier:4624 AND LogonType:3',
    return_fields='datetime,message,hostname,source_short'
)

# Add tags to events
for event in search.get('objects', []):
    sketch.tag_event(event['_id'], ['lateral_movement'])

Integration with Dissect

# Use Dissect for faster artifact parsing (alternative to Plaso)
target-query -f timesketch://timesketch.local/case-001 \
  targets/hostname/ -q "windows.evtx" --limit 0

Key Data Sources for Timeline Building

SourceParserEvidence Value
Windows Event Logs (.evtx)winevtxAuthentication, process execution, services
Prefetch FilesprefetchProgram execution history
MFT ($MFT)mftFile system activity
Registry HiveswinregSystem configuration, persistence
Browser Historychrome/firefoxWeb activity, downloads
SyslogsyslogLinux/network device events
CloudTrail LogsjsonlAWS API activity
Azure Activity LogsjsonlAzure resource operations
Firewall Logscsv/jsonlNetwork connections
Proxy Logscsv/jsonlHTTP/HTTPS traffic

MITRE ATT&CK Mapping

TechniqueTimeline Indicators
Initial Access (TA0001)First malicious event, phishing email receipt
Execution (T1059)PowerShell/CMD events, process creation
Persistence (TA0003)Registry modifications, scheduled tasks, services
Lateral Movement (TA0008)Remote logons, SMB connections, RDP sessions
Exfiltration (TA0010)Large data transfers, cloud storage uploads

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.3 (Incident Identification), CC7.4 (Incident Response), CC7.5 (Recovery)
  • ISO 27001: A.16.1 (Security Incident Management)
  • NIST 800-53: IR-1 through IR-10 (Incident Response Family)
  • NIST CSF: RS.RP (Response Planning), RS.CO (Communications), RC.RP (Recovery Planning)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add building-incident-timeline-with-timesketch

# Or load dynamically via MCP
grc.load_skill("building-incident-timeline-with-timesketch")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

References

  • Timesketch Official Documentation
  • Timesketch GitHub Repository
  • CISA Timesketch Resource
  • Hunt and Hackett: Scalable Forensics with Dissect and Timesketch
  • Plaso (log2timeline) Documentation

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add building-incident-timeline-with-timesketch
// Or via MCP
grc.load_skill("building-incident-timeline-with-timesketch")

Tags

timesketchtimeline-analysisforensic-timelineplasodfirincident-investigationcollaborative-forensics

Related Skills

Incident Response

Collecting Volatile Evidence from Compromised Host

5m·intermediate
Incident Response

Eradicating Malware from Infected Systems

4m·intermediate
Incident Response

Performing Active Directory Compromise Investigation

4m·intermediate
Incident Response

Performing Ransomware Incident Response

4m·intermediate
Incident Response

Containing Active Security Breach

4m·advanced
Incident Response

Implementing Velociraptor for Ir Collection

4m·advanced

Skill Details

Domain
Incident Response
Difficulty
intermediate
Read Time
4 min
Code Examples
12

On This Page

OverviewArchitecture and ComponentsDeploymentData Ingestion MethodsAnalysis WorkflowAdvanced FeaturesKey Data Sources for Timeline BuildingMITRE ATT&CK MappingReferencesVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →