Custom attacks are written in a *.csv file
- The first column indicates a delay in seconds
- The second column defines the function name
- Additional columns define the arguments of the function
I suggest to write the attack on an spreadsheet software like Excel or LibreOffice and save it to a csv, instead of hand-making the csv file.