{
"action": "get_tasking",
"tasking_size": 1,
"responses": [
{
"task_id": "uuid",
"user_output": "something to show to the user",
"completed": false,
"status": "custom status here",
"file_browser": {
"host": "abc.com",
"is_file": false,
"permissions": {
"customField": "customValue"
},
"name": "C:\\",
"parent_path": "",
"success": true,
"access_time": 1700164038000,
"modify_time": 1700164038000,
"size": 2300,
"update_deleted": false,
"files": [
{
"is_file": false,
"permissions": {
"customField": "custom value"
},
"name": "Users",
"access_time": 1700164038000,
"modify_time": 1700164038000,
"size": 12345
}
]
},
"removed_files": [
{
"host": "abc.com",
"path": "C:\\Users\\itsafeature\\Desktop\\evil.exe"
}
],
"credentials": [
{
"credential_type": "plaintext",
"realm": "domain.com",
"account": "itsafeature",
"credential": "oh no my password!",
"comment": "scraped from lsass",
"metadata": "anything else you want to add"
}
],
"artifacts": [
{
"base_artifact": "Process Create",
"artifact": "cmd.exe /C evil.exe",
"host": "abc.com"
}
],
"processes": [
{
"host": "abc.com",
"process_id": 245,
"parent_process_id": 244,
"architecture": "x64",
"bin_path": "C:\\Users\\itsafeature\\Desktop\\evil.exe",
"name": "evil.exe",
"user": "itsafeature",
"command_line": "C:\\Users\\itsafeature\\Desktop\\evil.exe -f 2",
"integrity_level": 2,
"start_time": 1700164038000,
"description": "totally not malware: TM",
"signer": "",
"protected_process_level": 0,
"update_deleted": false,
}
],
"edges": [
{
"source": "my uuid",
"destination": "uuid of remote callback",
"action": "remove",
"c2_profile": "smb",
}
],
"commands": [
{
"action": "add",
"cmd": "shell"
}
],
"keylogs": [
{
"window_title": "Notepad",
"user": "itsafeature",
"keystrokes": "password: abc123"
}
],
"tokens": [
{
"action": "add",
"token_id": 34857,
"user": "acme\\bob",
"groups": "",
"privileges": "",
"thread_id": 12345,
"process_id": 2344,
"session_id": 1,
"logon_sid": "",
"integrity_level_sid": ""
"restricted": false,
"default_dacl": "",
"handle": 0,
"capabilities": "",
"app_container_sid": "",
"app_container_number": 0
}
],
"callback_tokens": [
{
"action": "add",
"host": "abc.com",
"token_id": 34857,
"token": {
// same info from tokens if you wanted to add/update that data
}
}
],
"download": {
"total_chunks": 4,
"chunk_size": 512000,
"host": "abc.com",
"is_screenshot": false,
"filename": "evil.exe",
"full_path": "C:\\Users\\itsafeature\\Desktop\\evil.exe",
},
"upload": {
"file_id": "uuid here",
"host": "abc.com",
"chunk_size": 512000,
"chunk_num": 1,
"full_path": "C:\\Users\\itsafeature\\Desktop\\replaced.exe"
},
"alerts": [{
"alert": "lost connection to remote agent",
"level": "warning",
"source": "disconnection warning",
"send_webhook": false,
}],
"process_response": {
"custom field": "custom val"
}
}
],
"alerts": [{
"alert": "edr detected",
"level": "warning",
"source": "edr detection",
"send_webhook": true,
"webhook_alert": {
"edr": "some edr name",
"pid": 345
}
}],
"edges": [{
"action": "add",
"source": "my uuid",
"destination": "remote uuid",
"c2_profile": "smb",
"metadata": "anything else you want to add about the connection"
}],
"delegates": [{
"c2_profile": "tcp",
"message": "base64 message",
"uuid": "some uuid tracker here"
}],
"socks": [{
"server_id": 2345,
"data": "base64",
"exit": false
}],
"rpfwd": [{
"server_id": 12345,
"data": "base64",
"exit": false
}],
"interactive": [{
"task_id": "uuid of task that started interactive session",
"message_type": 0,
"data": "base64"
}],
}