Timelines and Pivoting

🧭 Timelines and Pivoting: Investigating Advanced Threat Activity

By James K. Bishop, vCISO | Founder, Stage Four Security

🔍 Why Timeline Reconstruction Matters

In advanced attacks—especially those involving lateral movement or stealthy persistence—single events rarely tell the whole story. To understand what happened, when, and how deep the compromise goes, you need to reconstruct a clear timeline across users, systems, logs, and evidence sources.

This post explores how to build forensic timelines and pivot across data to uncover attacker behavior, map the blast radius, and accelerate response.

🧱 Start With Anchor Events

Anchor events give you a foothold into the attacker’s activity:

  • Initial alert (e.g., EDR detection, login anomaly)
  • Known compromise time (e.g., phishing email timestamp)
  • System crash, unauthorized change, or first incident report

Use this to define your temporal scope and begin building a working timeline.

🔄 Pivoting: Chaining Events to Build Context

Pivoting is the investigative process of linking one data point to another. Start with an artifact (e.g., process name, IP address, user) and explore related activity:

  • IP address → process → parent process → user → login time
  • Registry key → executable path → hash → EDR detection → lateral connection

Tools like Elastic, Splunk, Velociraptor, and SOAR platforms support this type of chaining visually and through search queries.

🧪 Key Timeline Data Sources

These sources form the foundation of timeline investigations:

  • EDR/AV telemetry: Process creation, parent-child trees, DLL injection
  • System logs: Windows Event Logs, Linux auth logs, RDP sessions
  • Network logs: Firewall, proxy, DNS, and VPN session history
  • Cloud audit logs: AWS CloudTrail, Azure Activity Logs, Okta sign-ins
  • Disk timestamps: File creation, modification, access (MAC times)

Preserve the original timestamps and normalize timezones early. Time skew kills accuracy.

🧰 Building a Timeline: Tools & Formats

Organize findings chronologically in a format your team can understand:

  • CSV or JSON: Easy to share and ingest into tools
  • Graph tools: Like Timesketch, Kroll Artifact Parser, Velociraptor
  • Timeline spreadsheets: With columns for time, source, user, system, action, notes

Color code by user/system or tactic (initial access, execution, persistence, etc.). Highlight uncertainty where exact times aren’t known.

🔁 Look for Attacker TTPs

Use your timeline to identify attacker tactics, techniques, and procedures (TTPs):

  • Scheduled tasks or services as persistence
  • Credential dumping tools (e.g., Mimikatz, LaZagne)
  • Unusual parent-child process relationships (e.g., Word spawning PowerShell)
  • Non-interactive logins from unexpected geolocations

Match to MITRE ATT&CK techniques to label attacker behaviors and detect lateral movement paths.

🛑 Pitfalls to Avoid

  • Ignoring time drift between systems (NTP misconfig = bad pivots)
  • Relying on a single source (e.g., EDR) without cross-validation
  • Assuming one alert equals one compromise—watch for parallel activity
  • Missing gaps between attacker actions due to incomplete logging

Your timeline is only as good as your data. Gaps must be acknowledged, not filled with guesses.

📣 Final Thought

Timelines are the backbone of serious breach investigations. They help responders orient, prove, and defend their understanding of what really happened. The better your pivoting discipline and timestamp hygiene, the faster you move from chaos to clarity.

Need help building forensic timelines, tuning log sources, or correlating attacker activity across your environment? Let’s talk.

Scroll to Top