Forensic-Timeliner, a Windows forensic tool for DFIR investigators, has released version 2.2, which offers enhanced automation and improved artifact support for digital forensics and incident response operations.
This high-speed processing engine consolidates CSV output from leading triage utilities into a unified timeline, empowering analysts to reconstruct event sequences and identify key indicators of compromise rapidly.
Developed by Acquired Security, the tool’s core capability lies in its ability to discover and parse CSV artifacts generated by EZ Tools, KAPE, Axiom, Chainsaw, Hayabusa, and Nirsoft. Analysts simply point the tool at a base directory:
Interactive Menu
The engine applies YAML-driven filters defined in config/keywords/keywords.yaml, automatically detecting files by name, folder, or header patterns. New interactive enhancements in v2.2 include:
These tool features reduce manual effort and ensure repeatable, auditable processing across large-scale collections. Beyond basic timeline collation, Forensic-Timeliner offers advanced enrichment and export options.
Date filtering (–StartDate, –EndDate) and deduplication (–Deduplicate) to tailor timelines to the incident’s window of interest.
Raw data inclusion (–IncludeRawData) for forensic provenance, embedding original CSV rows in the output for forensic validation.
Configurable parsers via YAML definitions, mapping artifact CSV fields to a standard timeline schema:
DateTime | TimestampInfo | ArtifactName | Tool | Description | DataDetails | DataPath | FileExtension | EventId | User | Computer | FileSize | IPAddress | SHA1 | Count | EvidencePath.
The tool’s RFC-4180-compliant CSV output ensures seamless compatibility with Excel, Timeline Explorer, and other forensic review platforms. Analysts can also export in JSON or JSONL formats for integration with SIEMs and log management systems.
Customizable YAML parameters allow exclusion of undesired MFT extensions (default: .exe, .ps1, .zip, etc.) and path filters (default: Users), while built-in event-log filters restrict noise by channel and provider IDs.
Forensic-Timeliner v2.2’s mix of interactive setup, automated discovery, and keyword-driven enrichment positions it as an indispensable tool for DFIR investigators seeking speed, precision, and consistency in constructing Windows forensic timelines.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed RediShell, allows attackers to…
Paris, France, October 6th, 2025, CyberNewsWire Reemo continues its mission to secure enterprise remote access…
A threat actor has claimed responsibility for a significant data breach at Huawei Technologies, a…
Doctors Imaging Group, a healthcare provider based in Florida, has reported a significant data breach…
NCSC has issued an urgent warning regarding a critical zero-day flaw in Oracle E-Business Suite…
A critical security vulnerability has been discovered in Zabbix Agent and Agent 2 for Windows…