The timestamp should be automatic placed inside the field "_time". Splunk store time as seconds, but if you use it names "_time" it'll automatic format for you.
index=bla "your search" | table _time, id
Remember that Splunk stores the Time in seconds, but it'll auto-format to a more human readable if the field name is "_time". For example:
index=bla "your search" | eval time2=_time | table _time, time2, id
But you might be looking to do something like:
index=bla "your search" | transaction id | table _time, id, duration, status
Have a look on the transaction command documentation, there are plenty of option...
... View more