-
Notifications
You must be signed in to change notification settings - Fork 511
FS_Forensic_Timeline
The directory forensic/timeline exists as a sub-directory to the file system root.
The directory is hidden by default. It will appear once forensic mode has been started and processing is completed.
The directory contains various system artifacts ordered by time stamp in timelines. Currently timelines are shown in text format. A JSON data format is planned for the future but not yet implemented.
The files in the forensic/timeline directory are listed in the table below:
| File | Description |
|---|---|
| timeline/timeline_all.txt | All timelining information bundled into a single file. |
| timeline/timeline_net.txt | Network connection timeline. |
| timeline/timeline_ntfs.txt | NTFS MFT timeline. |
| timeline/timeline_process.txt | Process timeline. |
| timeline/timeline_registry.txt | Registry timeline. |
| timeline/timeline_thread.txt | Thread timeline. |
| timeline/timeline_[...].txt | Additional timelines generated by plugins. |
Files in the forensic/timeline directory are read-only.
The timeline have the following format:
DATE TYPE ACTION PID NUM HEX DESC
======================= ==== ====== ==== ==== ================ =================================
2019-03-29 15:42:08 UTC PROC DEL 4376 540 ffffcf00cbad7080 backgroundTask [*] backgroundTask
2019-03-29 15:40:38 UTC PROC CRE 5968 48 ffffcf00cec0e080 svchost.exe [*LOCAL SERVICE] \Device\HarddiskVolume2\Windows\System32\svchost.exe
2019-03-29 15:40:38 UTC PROC CRE 4376 540 ffffcf00cbad7080 backgroundTask [*] backgroundTask
The column ACTION may take the following values: CRE = Create/Start, MOD = Modify, RD = Read, DEL = Delete/Stop.
The columns NUM, HEX and DESC have different meaning depending on the type. A few examples are listed in the table below:
| Type | NUM | HEX |
|---|---|---|
| KObj | Object address | |
| Net | Object address | |
| NTFS | File size | MFT record physical address |
| PROC | Parent PID | EPROCESS address |
| THREAD | TID (Thread ID) | ETHREAD address |
The example shows the timeline directory containing timelines. The process timeline is open in notepad and the combined all timeline is open in notepad++.

The forensic/timeline sub-directory is implemented as a built-in native C-code plugin. The plugin source is located in the file modules/m_fc_timeline.c in the vmm project. It's possible for plugins to generate a timeline of their own by implementing the pfnTimeline callback function. An example of such a plugin is the networking plugin found in m_sysinfo_net.c in the vmm project.