Datasets:

ArXiv:
ChocoWu's picture
Upload folder using huggingface_hub
9d0ae93 verified
raw
history blame
206 kB
{
"set_type": "openset",
"task": "speech event extraction",
"data_source": "SpeechEventExtraction",
"type": "audio comprehension",
"modality": {
"in": [
"audio",
"text"
],
"out": "text"
},
"version": "1.0",
"data_description": "The SpeechEventExtraction dataset is a dataset for speech event extraction. The dataset contains audio recordings of speech events. The task is to extract the speech events in the audio.",
"data": [
{
"id": "see_00422",
"input": {
"audio_file": "train-422.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "the ransomware attack",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00233",
"input": {
"audio_file": "train-233.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach intercept",
"type": "data",
"arguments": [
{
"name": "data them",
"role": "compromised"
},
{
"name": "anyone",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00311",
"input": {
"audio_file": "train-311.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability said",
"type": "discover",
"arguments": [
{
"name": "company",
"role": "discoverer"
}
]
}
]
}
},
{
"id": "see_00164",
"input": {
"audio_file": "train-164.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "demands a payment",
"type": "ransom",
"arguments": [
{
"name": "pattern encrypts files",
"role": "attack"
},
{
"name": "pattern locks infected systems",
"role": "attack"
},
{
"name": "Ransomware",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00136",
"input": {
"audio_file": "train-136.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach steal",
"type": "data",
"arguments": [
{
"name": "scammers",
"role": "attacker"
},
{
"name": "fake emails",
"role": "tool"
},
{
"name": "data credentials",
"role": "compromised"
},
{
"name": "university staff",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00197",
"input": {
"audio_file": "train-197.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach hack",
"type": "data",
"arguments": [
{
"name": "data stolen data",
"role": "compromised"
},
{
"name": "QNB",
"role": "victim"
},
{
"name": "up for sale",
"role": "purpose"
}
]
}
]
}
},
{
"id": "see_00258",
"input": {
"audio_file": "train-258.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "blackmail money",
"type": "ransom",
"arguments": [
{
"name": "pattern deciding to leak as - yet unaired episodes",
"role": "attack"
},
{
"name": "Netflix",
"role": "victim"
},
{
"name": "The Dark Overlord hacking group",
"role": "attacker"
},
{
"name": "month ago",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00232",
"input": {
"audio_file": "train-232.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach obtain",
"type": "data",
"arguments": [
{
"name": "data login credentials",
"role": "compromised"
},
{
"name": "hackers",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00115",
"input": {
"audio_file": "train-115.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "phishing scam",
"type": "phishing",
"arguments": []
}
]
}
},
{
"id": "see_00120",
"input": {
"audio_file": "train-120.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "convincing",
"type": "phishing",
"arguments": [
{
"name": "The phishing emails",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00349",
"input": {
"audio_file": "train-349.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "blackmail",
"type": "ransom",
"arguments": [
{
"name": "pattern personal shopper data can be used",
"role": "attack"
},
{
"name": "hackers",
"role": "attacker"
},
{
"name": "pattern infer parts of customers \u2019 identities",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00224",
"input": {
"audio_file": "train-224.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransom demand",
"type": "ransom",
"arguments": [
{
"name": "Companies",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00402",
"input": {
"audio_file": "train-402.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "was tricked",
"type": "phishing",
"arguments": [
{
"name": "Barclays CEO Jes Staley",
"role": "victim"
},
{
"name": "this month",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00397",
"input": {
"audio_file": "train-397.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach have stolen",
"type": "data",
"arguments": [
{
"name": "they",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00127",
"input": {
"audio_file": "train-127.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransom demand",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00285",
"input": {
"audio_file": "train-285.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach steal",
"type": "data",
"arguments": [
{
"name": "data information",
"role": "compromised"
},
{
"name": "router",
"role": "victim"
},
{
"name": "pattern capture the blinking pattern",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00411",
"input": {
"audio_file": "train-411.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "paid up",
"type": "ransom",
"arguments": [
{
"name": "victims",
"role": "victim"
},
{
"name": "pattern promising to hold their end of the decryption bargain",
"role": "attack"
},
{
"name": "attackers",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00107",
"input": {
"audio_file": "train-107.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability have all been patched",
"type": "patch",
"arguments": [
{
"name": "An out of bounds read flaw",
"role": "vulnerability"
},
{
"name": "vulnerabilities and exposures CVE -2018-12824",
"role": "common"
},
{
"name": "a security bypass error",
"role": "vulnerability"
},
{
"name": "vulnerabilities and exposures CVE -2018-12825",
"role": "common"
},
{
"name": "two information disclosure vulnerabilities",
"role": "vulnerability"
},
{
"name": "vulnerabilities and exposures CVE -2018-12826",
"role": "common"
},
{
"name": "vulnerabilities and exposures CVE -2018-12827",
"role": "common"
},
{
"name": "vulnerabilities and exposures CVE -2018-12828",
"role": "common"
},
{
"name": "a privilege escalation flaw",
"role": "vulnerability"
}
]
}
]
}
},
{
"id": "see_00370",
"input": {
"audio_file": "train-370.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach breach",
"type": "data",
"arguments": [
{
"name": "intruders",
"role": "attacker"
},
{
"name": "data customer data",
"role": "compromised"
},
{
"name": "customers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00325",
"input": {
"audio_file": "train-325.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach exposure",
"type": "data",
"arguments": [
{
"name": "data cardholder data",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00133",
"input": {
"audio_file": "train-133.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "dupe",
"type": "phishing",
"arguments": [
{
"name": "Scammers",
"role": "attacker"
},
{
"name": "victims",
"role": "victim"
},
{
"name": "pattern use text messages",
"role": "attack"
},
{
"name": "paying for a fake subscription",
"role": "purpose"
}
]
}
]
}
},
{
"id": "see_00452",
"input": {
"audio_file": "train-452.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "payments",
"type": "ransom",
"arguments": [
{
"name": "Monday",
"role": "time"
},
{
"name": "method Bitcoin wallets",
"role": "payment"
},
{
"name": "malware",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00044",
"input": {
"audio_file": "train-44.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach stole",
"type": "data",
"arguments": [
{
"name": "data site credentials",
"role": "compromised"
},
{
"name": "Attacker",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00460",
"input": {
"audio_file": "train-460.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "trick",
"type": "phishing",
"arguments": [
{
"name": "users",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00065",
"input": {
"audio_file": "train-65.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach breaches",
"type": "data",
"arguments": [
{
"name": "data private financial data",
"role": "compromised"
},
{
"name": "of victim 143 million",
"role": "number"
},
{
"name": "consumers",
"role": "attacker"
},
{
"name": "consumers",
"role": "victim"
},
{
"name": "Equifax",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00283",
"input": {
"audio_file": "train-283.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach steal",
"type": "data",
"arguments": [
{
"name": "data data",
"role": "compromised"
},
{
"name": "router",
"role": "victim"
},
{
"name": "user",
"role": "victim"
},
{
"name": "computer",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00085",
"input": {
"audio_file": "train-85.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "phishing attacks",
"type": "phishing",
"arguments": []
}
]
}
},
{
"id": "see_00242",
"input": {
"audio_file": "train-242.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach unauthorized access",
"type": "data",
"arguments": [
{
"name": "data payment card data",
"role": "compromised"
},
{
"name": "April 18 , 2017",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00186",
"input": {
"audio_file": "train-186.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransomware attack",
"type": "ransom",
"arguments": [
{
"name": "$ 28,730",
"role": "price"
}
]
}
]
}
},
{
"id": "see_00383",
"input": {
"audio_file": "train-383.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach stolen",
"type": "data",
"arguments": [
{
"name": "data movie",
"role": "compromised"
},
{
"name": "Disney",
"role": "victim"
},
{
"name": "companies",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00159",
"input": {
"audio_file": "train-159.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "The attack",
"type": "ransom",
"arguments": [
{
"name": "Eastern Europe",
"role": "place"
}
]
}
]
}
},
{
"id": "see_00012",
"input": {
"audio_file": "train-12.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "demands",
"type": "ransom",
"arguments": [
{
"name": "0.05 BTC",
"role": "price"
},
{
"name": "$ 290",
"role": "price"
},
{
"name": "the ransomware",
"role": "tool"
},
{
"name": "Bad Rabbit",
"role": "tool"
},
{
"name": "computers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00035",
"input": {
"audio_file": "train-35.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability claim",
"type": "discover",
"arguments": [
{
"name": "Security researchers",
"role": "discoverer"
}
]
}
]
}
},
{
"id": "see_00028",
"input": {
"audio_file": "train-28.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability claim",
"type": "discover",
"arguments": [
{
"name": "Security researchers",
"role": "discoverer"
},
{
"name": "platform devices",
"role": "supported"
},
{
"name": "system macOS",
"role": "vulnerable"
},
{
"name": "system Windows",
"role": "vulnerable"
},
{
"name": "system iOS",
"role": "vulnerable"
},
{
"name": "system Android",
"role": "vulnerable"
},
{
"name": "system Linux",
"role": "vulnerable"
}
]
}
]
}
},
{
"id": "see_00170",
"input": {
"audio_file": "train-170.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "charge",
"type": "ransom",
"arguments": [
{
"name": "method in Bitcoin",
"role": "payment"
},
{
"name": "the victim",
"role": "victim"
},
{
"name": "The actors",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00142",
"input": {
"audio_file": "train-142.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach this leak",
"type": "data",
"arguments": [
{
"name": "data personal data",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00398",
"input": {
"audio_file": "train-398.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "extort money",
"type": "ransom",
"arguments": [
{
"name": "pattern threatening to make public",
"role": "attack"
},
{
"name": "Disney",
"role": "victim"
},
{
"name": "Hackers",
"role": "attacker"
},
{
"name": "pattern have been bluffing",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00342",
"input": {
"audio_file": "train-342.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach access",
"type": "data",
"arguments": [
{
"name": "data data",
"role": "compromised"
},
{
"name": "data data",
"role": "compromised"
},
{
"name": "data PII",
"role": "compromised"
},
{
"name": "servers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00221",
"input": {
"audio_file": "train-221.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pay",
"type": "ransom",
"arguments": [
{
"name": "companies",
"role": "victim"
},
{
"name": "pattern systems and networks disrupted",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00095",
"input": {
"audio_file": "train-95.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "were presented",
"type": "phishing",
"arguments": [
{
"name": "victims",
"role": "victim"
},
{
"name": "fake JavaScript",
"role": "tool"
},
{
"name": "pattern redirecting them to affiliate programs",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00051",
"input": {
"audio_file": "train-51.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach a data breach",
"type": "data",
"arguments": [
{
"name": "U.S. companies",
"role": "victim"
},
{
"name": "data lost or stolen record",
"role": "compromised"
},
{
"name": "June 2017",
"role": "time"
},
{
"name": "amount $ 7.4 million",
"role": "damage"
},
{
"name": "amount $ 225",
"role": "damage"
}
]
}
]
}
},
{
"id": "see_00240",
"input": {
"audio_file": "train-240.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach had been compromised",
"type": "data",
"arguments": [
{
"name": "November",
"role": "time"
},
{
"name": "GameStop.com",
"role": "victim"
},
{
"name": "data card",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00484",
"input": {
"audio_file": "train-484.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach were accessed",
"type": "data",
"arguments": [
{
"name": "data email addresses",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00378",
"input": {
"audio_file": "train-378.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach obtained",
"type": "data",
"arguments": [
{
"name": "data data",
"role": "compromised"
},
{
"name": "threat actor",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00178",
"input": {
"audio_file": "train-178.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "extorted",
"type": "ransom",
"arguments": [
{
"name": "These hackers",
"role": "attacker"
},
{
"name": "$ 1 million",
"role": "price"
},
{
"name": "one South Korean company",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00041",
"input": {
"audio_file": "train-41.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability is patched",
"type": "patch",
"arguments": [
{
"name": "system operating systems",
"role": "vulnerable"
},
{
"name": "the vulnerability",
"role": "vulnerability"
},
{
"name": "system version a beta version",
"role": "vulnerable"
},
{
"name": "Apple",
"role": "releaser"
}
]
}
]
}
},
{
"id": "see_00498",
"input": {
"audio_file": "train-498.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransom payments",
"type": "ransom",
"arguments": [
{
"name": "weekend",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00421",
"input": {
"audio_file": "train-421.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability disclose",
"type": "discover",
"arguments": [
{
"name": "a zero - day vulnerability",
"role": "vulnerability"
},
{
"name": "federal government",
"role": "discoverer"
},
{
"name": "system owner manufacturer",
"role": "vulnerable"
}
]
}
]
}
},
{
"id": "see_00206",
"input": {
"audio_file": "train-206.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransomware attack",
"type": "ransom",
"arguments": [
{
"name": "central London university",
"role": "victim"
},
{
"name": "Wednesday",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00282",
"input": {
"audio_file": "train-282.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach extract",
"type": "data",
"arguments": [
{
"name": "hackers",
"role": "attacker"
},
{
"name": "data data",
"role": "compromised"
},
{
"name": "victim",
"role": "victim"
},
{
"name": "computer",
"role": "victim"
},
{
"name": "router",
"role": "victim"
},
{
"name": "pattern using the LED lights",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00254",
"input": {
"audio_file": "train-254.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "Paying",
"type": "ransom",
"arguments": [
{
"name": "extortionists",
"role": "attacker"
},
{
"name": "blackmailers",
"role": "attacker"
},
{
"name": "company",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00412",
"input": {
"audio_file": "train-412.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data breach",
"type": "data",
"arguments": [
{
"name": "PureMatrimony.com",
"role": "victim"
},
{
"name": "Muslim focused site",
"role": "victim"
},
{
"name": "users",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00004",
"input": {
"audio_file": "train-4.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "lures",
"type": "phishing",
"arguments": [
{
"name": "the potential target",
"role": "victim"
},
{
"name": "pattern clicking on the provided URL",
"role": "attack"
},
{
"name": "pattern The scam uses a basic social engineering technique",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00256",
"input": {
"audio_file": "train-256.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach the game stolen",
"type": "data",
"arguments": [
{
"name": "hackers",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00448",
"input": {
"audio_file": "train-448.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransom demands",
"type": "ransom",
"arguments": [
{
"name": "Netflix",
"role": "victim"
},
{
"name": "April 2017",
"role": "time"
},
{
"name": "The Dark Overlord",
"role": "attacker"
},
{
"name": "a group of hackers",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00100",
"input": {
"audio_file": "train-100.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability impacts",
"type": "patch",
"arguments": [
{
"name": "The patch release",
"role": "patch"
},
{
"name": "system Adobe Flash",
"role": "vulnerable"
},
{
"name": "system Acrobat and Reader",
"role": "vulnerable"
},
{
"name": "system Experience Manager",
"role": "vulnerable"
},
{
"name": "system Creative Cloud",
"role": "vulnerable"
}
]
}
]
}
},
{
"id": "see_00226",
"input": {
"audio_file": "train-226.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data breaches",
"type": "data",
"arguments": [
{
"name": "hackers",
"role": "attacker"
},
{
"name": "Companies",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00429",
"input": {
"audio_file": "train-429.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "WannaCry attack",
"type": "ransom",
"arguments": [
{
"name": "pattern hack exploits the same Microsoft vulnerabilities",
"role": "attack"
},
{
"name": "computers",
"role": "victim"
},
{
"name": "pattern infected",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00213",
"input": {
"audio_file": "train-213.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransom demanded",
"type": "ransom",
"arguments": [
{
"name": "5 bitcoins",
"role": "price"
},
{
"name": "USD 12,344",
"role": "price"
}
]
}
]
}
},
{
"id": "see_00171",
"input": {
"audio_file": "train-171.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "demand",
"type": "ransom",
"arguments": [
{
"name": "The ransomware",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00098",
"input": {
"audio_file": "train-98.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "had created",
"type": "phishing",
"arguments": [
{
"name": "a convincing copy",
"role": "tool"
},
{
"name": "The attackers",
"role": "attacker"
},
{
"name": "entity real account login page",
"role": "trusted"
},
{
"name": "entity Google",
"role": "trusted"
}
]
}
]
}
},
{
"id": "see_00292",
"input": {
"audio_file": "train-292.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach leaked",
"type": "data",
"arguments": [
{
"name": "Netflix",
"role": "victim"
},
{
"name": "hacker group",
"role": "attacker"
},
{
"name": "end of April",
"role": "time"
},
{
"name": "data first ten episodes",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00215",
"input": {
"audio_file": "train-215.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach leaked",
"type": "data",
"arguments": [
{
"name": "data stolen data",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00061",
"input": {
"audio_file": "train-61.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach Data leaks",
"type": "data",
"arguments": [
{
"name": "Long Island companies",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00047",
"input": {
"audio_file": "train-47.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach was stolen",
"type": "data",
"arguments": [
{
"name": "data sensitive customer data",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00032",
"input": {
"audio_file": "train-32.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability released",
"type": "patch",
"arguments": [
{
"name": "Microsoft",
"role": "releaser"
},
{
"name": "the Windows updates",
"role": "patch"
},
{
"name": "October 10th",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00267",
"input": {
"audio_file": "train-267.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability patches",
"type": "patch",
"arguments": [
{
"name": "Chinese company",
"role": "releaser"
},
{
"name": "system firmware",
"role": "vulnerable"
},
{
"name": "system IP camera",
"role": "vulnerable"
},
{
"name": "Fosscam",
"role": "releaser"
}
]
}
]
}
},
{
"id": "see_00327",
"input": {
"audio_file": "train-327.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach copies",
"type": "data",
"arguments": [
{
"name": "malware",
"role": "tool"
},
{
"name": "data credit card information",
"role": "compromised"
},
{
"name": "card \u2019s magnetic strip",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00200",
"input": {
"audio_file": "train-200.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach exfiltration",
"type": "data",
"arguments": [
{
"name": "data financial information",
"role": "compromised"
},
{
"name": "pattern install a backdoor",
"role": "attack"
},
{
"name": "pattern gain control of the target businesses \u2019 systems",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00446",
"input": {
"audio_file": "train-446.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pay",
"type": "ransom",
"arguments": [
{
"name": "the attackers",
"role": "attacker"
},
{
"name": "Disney",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00027",
"input": {
"audio_file": "train-27.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability affecting",
"type": "discover",
"arguments": [
{
"name": "system owner Technology companies",
"role": "vulnerable"
},
{
"name": "system Wi - Fi networks",
"role": "vulnerable"
},
{
"name": "system WPA",
"role": "vulnerable"
},
{
"name": "system WPA2",
"role": "vulnerable"
},
{
"name": "a new Wi - Fi exploit",
"role": "vulnerability"
}
]
}
]
}
},
{
"id": "see_00424",
"input": {
"audio_file": "train-424.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "WannaCry ransomware attacks",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00230",
"input": {
"audio_file": "train-230.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data breaches",
"type": "data",
"arguments": [
{
"name": "hackers",
"role": "attacker"
},
{
"name": "of data 6 million",
"role": "number"
},
{
"name": "data accounts",
"role": "compromised"
},
{
"name": "CashCrate",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00260",
"input": {
"audio_file": "train-260.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach leaked",
"type": "data",
"arguments": [
{
"name": "September 2003",
"role": "time"
},
{
"name": "German hacker",
"role": "victim"
},
{
"name": "data the source code",
"role": "compromised"
},
{
"name": "game Half - Life 2",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00288",
"input": {
"audio_file": "train-288.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data exfiltration",
"type": "data",
"arguments": []
}
]
}
},
{
"id": "see_00162",
"input": {
"audio_file": "train-162.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability made available",
"type": "patch",
"arguments": [
{
"name": "addressed EternalBlue exploited",
"role": "issues"
},
{
"name": "the Windows flaw",
"role": "vulnerability"
},
{
"name": "a patch",
"role": "patch"
},
{
"name": "March",
"role": "time"
},
{
"name": "Microsoft",
"role": "releaser"
}
]
}
]
}
},
{
"id": "see_00425",
"input": {
"audio_file": "train-425.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "WannaCry ransomware attacks",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00138",
"input": {
"audio_file": "train-138.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data leak",
"type": "data",
"arguments": [
{
"name": "Verizon Communications",
"role": "victim"
},
{
"name": "cloud server",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00062",
"input": {
"audio_file": "train-62.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach had breached",
"type": "data",
"arguments": [
{
"name": "stores",
"role": "victim"
},
{
"name": "of victim three",
"role": "number"
},
{
"name": "data the credit card database",
"role": "compromised"
},
{
"name": "foreign hackers",
"role": "attacker"
},
{
"name": "2014",
"role": "time"
},
{
"name": "Uncle Giuseppe",
"role": "victim"
},
{
"name": "Farmingdale - based supermarket",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00135",
"input": {
"audio_file": "train-135.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "lure",
"type": "phishing",
"arguments": [
{
"name": "Scammers",
"role": "attacker"
},
{
"name": "victims",
"role": "victim"
},
{
"name": "handing over their credit card information",
"role": "purpose"
},
{
"name": "installing malware",
"role": "purpose"
}
]
}
]
}
},
{
"id": "see_00128",
"input": {
"audio_file": "train-128.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "the attack",
"type": "ransom",
"arguments": [
{
"name": "the months",
"role": "time"
},
{
"name": "method the bitcoin wallets",
"role": "payment"
}
]
}
]
}
},
{
"id": "see_00476",
"input": {
"audio_file": "train-476.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pay the ransom",
"type": "ransom",
"arguments": [
{
"name": "Disney",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00008",
"input": {
"audio_file": "train-8.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "sends out",
"type": "phishing",
"arguments": [
{
"name": "the deceptive messages",
"role": "tool"
},
{
"name": "victim",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00326",
"input": {
"audio_file": "train-326.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach steal",
"type": "data",
"arguments": [
{
"name": "company",
"role": "victim"
},
{
"name": "systems",
"role": "victim"
},
{
"name": "pattern were hit with a malware",
"role": "attack"
},
{
"name": "data credit card data",
"role": "compromised"
},
{
"name": "point - of - sale devices",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00463",
"input": {
"audio_file": "train-463.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "paying the ransom",
"type": "ransom",
"arguments": [
{
"name": "people",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00064",
"input": {
"audio_file": "train-64.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability update",
"type": "patch",
"arguments": [
{
"name": "system its software",
"role": "vulnerable"
},
{
"name": "Equifax",
"role": "releaser"
}
]
}
]
}
},
{
"id": "see_00300",
"input": {
"audio_file": "train-300.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach exposed",
"type": "data",
"arguments": [
{
"name": "of data 280 million",
"role": "number"
},
{
"name": "data records",
"role": "compromised"
},
{
"name": "data data",
"role": "compromised"
},
{
"name": "of data 163 GB",
"role": "number"
}
]
}
]
}
},
{
"id": "see_00014",
"input": {
"audio_file": "train-14.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "the latest cyberattack",
"type": "ransom",
"arguments": [
{
"name": "Bad Rabbit",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00156",
"input": {
"audio_file": "train-156.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransom demands",
"type": "ransom",
"arguments": [
{
"name": "a Russian oil giant",
"role": "victim"
},
{
"name": "a Danish shipping and energy conglomerate",
"role": "victim"
},
{
"name": "Ukrainian government ministries",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00040",
"input": {
"audio_file": "train-40.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability patched or unpatched",
"type": "patch",
"arguments": [
{
"name": "system all their Wi - Fi devices",
"role": "vulnerable"
}
]
}
]
}
},
{
"id": "see_00379",
"input": {
"audio_file": "train-379.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data breach",
"type": "data",
"arguments": [
{
"name": "identity management firm",
"role": "victim"
},
{
"name": "the single sign - on ( SSO )",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00468",
"input": {
"audio_file": "train-468.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "had paid the ransom",
"type": "ransom",
"arguments": [
{
"name": "individuals",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00403",
"input": {
"audio_file": "train-403.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "a global cyberattack",
"type": "ransom",
"arguments": [
{
"name": "One week ago",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00216",
"input": {
"audio_file": "train-216.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "extortion",
"type": "ransom",
"arguments": [
{
"name": "pattern destruction of systems",
"role": "attack"
},
{
"name": "FIN10",
"role": "attacker"
},
{
"name": "threat actors",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00279",
"input": {
"audio_file": "train-279.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability had discovered",
"type": "discover",
"arguments": [
{
"name": "we",
"role": "discoverer"
},
{
"name": "system Nexus 6",
"role": "vulnerable"
},
{
"name": "Hay",
"role": "discoverer"
},
{
"name": "May",
"role": "time"
},
{
"name": "vulnerability",
"role": "vulnerability"
},
{
"name": "vulnerabilities and exposures CVE -2016-10277",
"role": "common"
}
]
}
]
}
},
{
"id": "see_00434",
"input": {
"audio_file": "train-434.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach obtain",
"type": "data",
"arguments": [
{
"name": "data user emails",
"role": "compromised"
},
{
"name": "the malware",
"role": "tool"
},
{
"name": "data the DocuSign database",
"role": "compromised"
},
{
"name": "customer",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00430",
"input": {
"audio_file": "train-430.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "extorted",
"type": "ransom",
"arguments": [
{
"name": "the WannaCry hackers",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00337",
"input": {
"audio_file": "train-337.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "extortion",
"type": "ransom",
"arguments": [
{
"name": "MongoDB",
"role": "victim"
},
{
"name": "Hadoop",
"role": "victim"
},
{
"name": "CouchDB",
"role": "victim"
},
{
"name": "hackers",
"role": "attacker"
},
{
"name": "pattern scanning for vulnerable servers to attack",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00236",
"input": {
"audio_file": "train-236.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach stolen",
"type": "data",
"arguments": [
{
"name": "data three - digit card verification values ( CVV2 )",
"role": "compromised"
},
{
"name": "data addresses",
"role": "compromised"
},
{
"name": "data names",
"role": "compromised"
},
{
"name": "data expiration dates",
"role": "compromised"
},
{
"name": "data card numbers",
"role": "compromised"
},
{
"name": "data bankcard data",
"role": "compromised"
},
{
"name": "GameStop",
"role": "victim"
},
{
"name": "online customers",
"role": "victim"
},
{
"name": "data credit card",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00207",
"input": {
"audio_file": "train-207.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "Ransomware attacks",
"type": "ransom",
"arguments": [
{
"name": "computer systems",
"role": "victim"
},
{
"name": "pattern are locked and threatened with damaging software",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00212",
"input": {
"audio_file": "train-212.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "paid",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00295",
"input": {
"audio_file": "train-295.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability report",
"type": "discover",
"arguments": [
{
"name": "Appthority",
"role": "discoverer"
},
{
"name": "cloud back - end security vulnerabilities",
"role": "vulnerability"
}
]
}
]
}
},
{
"id": "see_00457",
"input": {
"audio_file": "train-457.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "payment",
"type": "ransom",
"arguments": [
{
"name": "three days",
"role": "time"
},
{
"name": "seven days",
"role": "time"
},
{
"name": "pattern the files would be lost forever",
"role": "attack"
},
{
"name": "users",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00251",
"input": {
"audio_file": "train-251.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach have stolen",
"type": "data",
"arguments": [
{
"name": "data files",
"role": "compromised"
},
{
"name": "company",
"role": "victim"
},
{
"name": "CD Projekt Red",
"role": "victim"
},
{
"name": "data documents",
"role": "compromised"
},
{
"name": "extortionists",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00488",
"input": {
"audio_file": "train-488.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "were hit",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00486",
"input": {
"audio_file": "train-486.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "looks like",
"type": "phishing",
"arguments": [
{
"name": "entity DocuSign",
"role": "trusted"
},
{
"name": "email",
"role": "tool"
},
{
"name": "pattern clicking a link",
"role": "attack"
},
{
"name": "the message",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00303",
"input": {
"audio_file": "train-303.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "ransomware attacks",
"type": "ransom",
"arguments": [
{
"name": "MongoDB databases",
"role": "victim"
},
{
"name": "Elasticsearch servers",
"role": "victim"
},
{
"name": "earlier this year",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00350",
"input": {
"audio_file": "train-350.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "duped",
"type": "phishing",
"arguments": [
{
"name": "Web users",
"role": "victim"
},
{
"name": "entering their username and passwords",
"role": "purpose"
},
{
"name": "fake websites",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00269",
"input": {
"audio_file": "train-269.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability said",
"type": "discover",
"arguments": [
{
"name": "Aleph Research",
"role": "discoverer"
}
]
}
]
}
},
{
"id": "see_00201",
"input": {
"audio_file": "train-201.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "is well - tailored",
"type": "phishing",
"arguments": [
{
"name": "pattern malicious Word document attached",
"role": "attack"
},
{
"name": "phishing email",
"role": "tool"
},
{
"name": "business",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00161",
"input": {
"audio_file": "train-161.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability discovered",
"type": "discover",
"arguments": [
{
"name": "a weakness",
"role": "vulnerability"
},
{
"name": "the NSA",
"role": "discoverer"
},
{
"name": "years ago",
"role": "time"
},
{
"name": "the vulnerability",
"role": "vulnerability"
},
{
"name": "exploited by Petya",
"role": "capabilities"
},
{
"name": "turned into a hacking tool",
"role": "capabilities"
}
]
}
]
}
},
{
"id": "see_00043",
"input": {
"audio_file": "train-43.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach has gained access",
"type": "data",
"arguments": [
{
"name": "attacker",
"role": "attacker"
},
{
"name": "the infrastructure hosting its website",
"role": "victim"
},
{
"name": "Forrester.com",
"role": "victim"
},
{
"name": "attackers",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00217",
"input": {
"audio_file": "train-217.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pay a hefty ransom",
"type": "ransom",
"arguments": [
{
"name": "hackers",
"role": "attacker"
},
{
"name": "networks",
"role": "victim"
},
{
"name": "systems",
"role": "victim"
},
{
"name": "North American companies",
"role": "victim"
},
{
"name": "pattern threatening to leak the stolen information",
"role": "attack"
},
{
"name": "company",
"role": "victim"
},
{
"name": "pattern disrupting their networks",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00401",
"input": {
"audio_file": "train-401.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pay a ransom",
"type": "ransom",
"arguments": [
{
"name": "the streaming giant",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00190",
"input": {
"audio_file": "train-190.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach selling",
"type": "data",
"arguments": [
{
"name": "Hackers",
"role": "attacker"
},
{
"name": "data stolen data",
"role": "compromised"
},
{
"name": "UAE InvestBank",
"role": "victim"
},
{
"name": "Qatar National Bank ( QNB )",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00309",
"input": {
"audio_file": "train-309.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach been accessed",
"type": "data",
"arguments": [
{
"name": "unauthorized individuals",
"role": "attacker"
},
{
"name": "data data",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00259",
"input": {
"audio_file": "train-259.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach published",
"type": "data",
"arguments": [
{
"name": "hacking group",
"role": "attacker"
},
{
"name": "of data 180,000",
"role": "number"
},
{
"name": "data medical records",
"role": "compromised"
},
{
"name": "data insurance and social security numbers",
"role": "compromised"
},
{
"name": "data dates of birth",
"role": "compromised"
},
{
"name": "data payment information",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00105",
"input": {
"audio_file": "train-105.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability says",
"type": "discover",
"arguments": [
{
"name": "The tech giant",
"role": "discoverer"
},
{
"name": "an out of bounds write issue",
"role": "vulnerability"
},
{
"name": "the security flaws",
"role": "vulnerability"
},
{
"name": "an untrusted pointer dereference problem",
"role": "vulnerability"
},
{
"name": "vulnerabilities and exposures CVE -2018-12799",
"role": "common"
},
{
"name": "lead to arbitrary code execution",
"role": "capabilities"
},
{
"name": "vulnerabilities and exposures CVE -2018-12808",
"role": "common"
}
]
}
]
}
},
{
"id": "see_00053",
"input": {
"audio_file": "train-53.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach was exposed",
"type": "data",
"arguments": [
{
"name": "data birth dates",
"role": "compromised"
},
{
"name": "data Social Security numbers",
"role": "compromised"
},
{
"name": "data sensitive data",
"role": "compromised"
},
{
"name": "of victim 143 million",
"role": "number"
},
{
"name": "consumers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00389",
"input": {
"audio_file": "train-389.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach stolen",
"type": "data",
"arguments": [
{
"name": "data a movie",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00001",
"input": {
"audio_file": "train-1.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "the scam",
"type": "phishing",
"arguments": [
{
"name": "steal personal and credit card information",
"role": "purpose"
}
]
}
]
}
},
{
"id": "see_00441",
"input": {
"audio_file": "train-441.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "asked to be paid",
"type": "ransom",
"arguments": [
{
"name": "pattern release the stolen information",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00482",
"input": {
"audio_file": "train-482.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "send",
"type": "phishing",
"arguments": [
{
"name": "malicious third party",
"role": "attacker"
},
{
"name": "customers",
"role": "victim"
},
{
"name": "users",
"role": "victim"
},
{
"name": "the messages",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00049",
"input": {
"audio_file": "train-49.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach gain access",
"type": "data",
"arguments": [
{
"name": "scam artists",
"role": "attacker"
},
{
"name": "data member accounts",
"role": "compromised"
},
{
"name": "pattern through phishing emails",
"role": "attack"
},
{
"name": "defraud other members",
"role": "purpose"
},
{
"name": "eBay",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00419",
"input": {
"audio_file": "train-419.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability put out",
"type": "patch",
"arguments": [
{
"name": "Microsoft",
"role": "releaser"
},
{
"name": "immediate patch",
"role": "patch"
}
]
}
]
}
},
{
"id": "see_00080",
"input": {
"audio_file": "train-80.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "look like",
"type": "phishing",
"arguments": []
}
]
}
},
{
"id": "see_00205",
"input": {
"audio_file": "train-205.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "\" ransomware \" attack",
"type": "ransom",
"arguments": [
{
"name": "NHS computer systems",
"role": "victim"
},
{
"name": "university",
"role": "victim"
},
{
"name": "last month",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00034",
"input": {
"audio_file": "train-34.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability receive",
"type": "patch",
"arguments": [
{
"name": "system Pixel devices",
"role": "vulnerable"
},
{
"name": "November 6 , 2017",
"role": "time"
},
{
"name": "Google",
"role": "releaser"
},
{
"name": "fixes",
"role": "patch"
}
]
}
]
}
},
{
"id": "see_00263",
"input": {
"audio_file": "train-263.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability are riddled",
"type": "discover",
"arguments": [
{
"name": "security flaws",
"role": "vulnerability"
},
{
"name": "system owner Chinese vendor Fosscam",
"role": "vulnerable"
},
{
"name": "system IP cameras",
"role": "vulnerable"
},
{
"name": "allow an attacker to take over the device",
"role": "capabilities"
},
{
"name": "penetrate your network",
"role": "capabilities"
}
]
}
]
}
},
{
"id": "see_00427",
"input": {
"audio_file": "train-427.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "appear to be",
"type": "phishing",
"arguments": [
{
"name": "transfer",
"role": "purpose"
},
{
"name": "entity Bangladeshi central bank",
"role": "trusted"
},
{
"name": "amount $ 1 billion",
"role": "damage"
}
]
}
]
}
},
{
"id": "see_00366",
"input": {
"audio_file": "train-366.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability be exploited",
"type": "discover",
"arguments": [
{
"name": "The Linux flaw",
"role": "vulnerability"
},
{
"name": "privileges to execute commands",
"role": "capabilities"
},
{
"name": "allow attackers to escalate their privileges to root",
"role": "capabilities"
},
{
"name": "system Sudo",
"role": "vulnerable"
}
]
}
]
}
},
{
"id": "see_00091",
"input": {
"audio_file": "train-91.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "have been phishing",
"type": "phishing",
"arguments": [
{
"name": "Attackers",
"role": "attacker"
},
{
"name": "developers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00339",
"input": {
"audio_file": "train-339.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach accessing",
"type": "data",
"arguments": [
{
"name": "data company data",
"role": "compromised"
},
{
"name": "data database",
"role": "compromised"
},
{
"name": "bad actor",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00473",
"input": {
"audio_file": "train-473.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "extort money",
"type": "ransom",
"arguments": [
{
"name": "the mass media giant",
"role": "victim"
},
{
"name": "hackers",
"role": "attacker"
},
{
"name": "the firm",
"role": "victim"
},
{
"name": "pattern threatening to release a film",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00052",
"input": {
"audio_file": "train-52.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data breaches",
"type": "data",
"arguments": []
}
]
}
},
{
"id": "see_00345",
"input": {
"audio_file": "train-345.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach were exposed and leaked",
"type": "data",
"arguments": [
{
"name": "data Pulse customer data",
"role": "compromised"
},
{
"name": "data data records",
"role": "compromised"
},
{
"name": "app",
"role": "victim"
},
{
"name": "Pulse Workspace",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00264",
"input": {
"audio_file": "train-264.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability published",
"type": "discover",
"arguments": [
{
"name": "findings",
"role": "vulnerability"
},
{
"name": "Finnish cyber-security firm F - Secure",
"role": "discoverer"
},
{
"name": "yesterday",
"role": "time"
},
{
"name": "issues",
"role": "vulnerability"
}
]
}
]
}
},
{
"id": "see_00241",
"input": {
"audio_file": "train-241.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach have been obtained",
"type": "data",
"arguments": [
{
"name": "unauthorized individuals",
"role": "attacker"
},
{
"name": "www.GameStop.com",
"role": "victim"
},
{
"name": "data data from payment card",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00013",
"input": {
"audio_file": "train-13.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pretends to be",
"type": "phishing",
"arguments": [
{
"name": "entity an Adobe Flash installer",
"role": "trusted"
},
{
"name": "the malware dropper",
"role": "tool"
},
{
"name": "the victim",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00315",
"input": {
"audio_file": "train-315.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "WannaCry damage",
"type": "ransom",
"arguments": [
{
"name": "machines",
"role": "victim"
},
{
"name": "Windows 7",
"role": "victim"
},
{
"name": "EternalBlue",
"role": "tool"
},
{
"name": "Windows 10",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00088",
"input": {
"audio_file": "train-88.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "phishing attempts",
"type": "phishing",
"arguments": []
}
]
}
},
{
"id": "see_00387",
"input": {
"audio_file": "train-387.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach been stolen",
"type": "data",
"arguments": [
{
"name": "data a movie",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00273",
"input": {
"audio_file": "train-273.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability were still vulnerable",
"type": "discover",
"arguments": [
{
"name": "system Moto G4 and G5",
"role": "vulnerable"
},
{
"name": "kernel command line injection flaw",
"role": "vulnerability"
}
]
}
]
}
},
{
"id": "see_00166",
"input": {
"audio_file": "train-166.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "payment demands",
"type": "ransom",
"arguments": [
{
"name": "a few hundred dollars",
"role": "price"
}
]
}
]
}
},
{
"id": "see_00328",
"input": {
"audio_file": "train-328.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach breach",
"type": "data",
"arguments": [
{
"name": "retail chain",
"role": "victim"
},
{
"name": "2014",
"role": "time"
},
{
"name": "data stolen data",
"role": "compromised"
},
{
"name": "data personal information",
"role": "compromised"
},
{
"name": "data customer names",
"role": "compromised"
},
{
"name": "data emails addresses",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00492",
"input": {
"audio_file": "train-492.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "WannaCrypt attacks",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00134",
"input": {
"audio_file": "train-134.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "receive",
"type": "phishing",
"arguments": [
{
"name": "the email",
"role": "tool"
},
{
"name": "pattern click on any of the links",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00306",
"input": {
"audio_file": "train-306.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data access",
"type": "data",
"arguments": []
}
]
}
},
{
"id": "see_00480",
"input": {
"audio_file": "train-480.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "was tracking",
"type": "phishing",
"arguments": [
{
"name": "pattern malicious email campaign",
"role": "attack"
},
{
"name": "May 9",
"role": "time"
},
{
"name": "entity DocuSign",
"role": "trusted"
}
]
}
]
}
},
{
"id": "see_00319",
"input": {
"audio_file": "train-319.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability are released",
"type": "patch",
"arguments": [
{
"name": "patches",
"role": "patch"
}
]
}
]
}
},
{
"id": "see_00243",
"input": {
"audio_file": "train-243.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach breach",
"type": "data",
"arguments": [
{
"name": "customers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00054",
"input": {
"audio_file": "train-54.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "send",
"type": "phishing",
"arguments": [
{
"name": "phishing emails",
"role": "tool"
},
{
"name": "specialized tools",
"role": "tool"
},
{
"name": "cybercriminals",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00363",
"input": {
"audio_file": "train-363.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability reporting",
"type": "discover",
"arguments": [
{
"name": "hacker",
"role": "discoverer"
},
{
"name": "a bug",
"role": "vulnerability"
},
{
"name": "system owner AlphaBay staff",
"role": "vulnerable"
},
{
"name": "allowed an attacker access",
"role": "capabilities"
},
{
"name": "January",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00050",
"input": {
"audio_file": "train-50.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "attract",
"type": "phishing",
"arguments": [
{
"name": "consumers",
"role": "victim"
},
{
"name": "entity trusted brand",
"role": "trusted"
},
{
"name": "entity eBay",
"role": "trusted"
},
{
"name": "Criminals",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00456",
"input": {
"audio_file": "train-456.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pay",
"type": "ransom",
"arguments": [
{
"name": "Users",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00174",
"input": {
"audio_file": "train-174.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "being paid",
"type": "ransom",
"arguments": [
{
"name": "$ 33,000",
"role": "price"
},
{
"name": "method a Bitcoin wallet",
"role": "payment"
},
{
"name": "SamSam",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00445",
"input": {
"audio_file": "train-445.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "had demanded",
"type": "ransom",
"arguments": [
{
"name": "hackers",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00189",
"input": {
"audio_file": "train-189.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "Paying ransomware",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00496",
"input": {
"audio_file": "train-496.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "demanded Bitcoin payments",
"type": "ransom",
"arguments": [
{
"name": "The ransomware",
"role": "tool"
},
{
"name": "hackers",
"role": "attacker"
},
{
"name": "the victims",
"role": "victim"
},
{
"name": "computers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00187",
"input": {
"audio_file": "train-187.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "already paid",
"type": "ransom",
"arguments": [
{
"name": "$ 1 million",
"role": "price"
}
]
}
]
}
},
{
"id": "see_00169",
"input": {
"audio_file": "train-169.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "their demands",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00058",
"input": {
"audio_file": "train-58.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "sent out",
"type": "phishing",
"arguments": [
{
"name": "April",
"role": "time"
},
{
"name": "Northwell",
"role": "attacker"
},
{
"name": "phishing emails",
"role": "tool"
},
{
"name": "entity a tax theme",
"role": "trusted"
}
]
}
]
}
},
{
"id": "see_00048",
"input": {
"audio_file": "train-48.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pretended to be",
"type": "phishing",
"arguments": [
{
"name": "entity the buyer",
"role": "trusted"
},
{
"name": "pattern hacked into a real user 's account",
"role": "attack"
},
{
"name": "the scammer",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00344",
"input": {
"audio_file": "train-344.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach leaked",
"type": "data",
"arguments": [
{
"name": "data data",
"role": "compromised"
},
{
"name": "Pulse Workspace",
"role": "victim"
},
{
"name": "mobile VPN app",
"role": "victim"
},
{
"name": "service providers",
"role": "victim"
},
{
"name": "government agencies",
"role": "victim"
},
{
"name": "enterprises",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00235",
"input": {
"audio_file": "train-235.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach breach",
"type": "data",
"arguments": [
{
"name": "this week",
"role": "time"
},
{
"name": "customers",
"role": "victim"
},
{
"name": "GameStop",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00252",
"input": {
"audio_file": "train-252.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "pay the ransom being demanded",
"type": "ransom",
"arguments": [
{
"name": "CD Projekt Red",
"role": "victim"
},
{
"name": "thieves",
"role": "attacker"
},
{
"name": "pattern threatening to release the stolen files",
"role": "attack"
}
]
}
]
}
},
{
"id": "see_00021",
"input": {
"audio_file": "train-21.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability discovered",
"type": "discover",
"arguments": [
{
"name": "security researcher",
"role": "discoverer"
},
{
"name": "the flaw",
"role": "vulnerability"
},
{
"name": "decrypt traffic",
"role": "capabilities"
},
{
"name": "hijack connections",
"role": "capabilities"
},
{
"name": "perform man - in - the - middle attacks",
"role": "capabilities"
},
{
"name": "eavesdrop on communication",
"role": "capabilities"
},
{
"name": "system a WPA2 - enabled device",
"role": "vulnerable"
},
{
"name": "academic Mathy Vanhoef",
"role": "discoverer"
}
]
}
]
}
},
{
"id": "see_00313",
"input": {
"audio_file": "train-313.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability vulnerable",
"type": "discover",
"arguments": [
{
"name": "system machines",
"role": "vulnerable"
},
{
"name": "system Window 10",
"role": "vulnerable"
},
{
"name": "flaw",
"role": "vulnerability"
},
{
"name": "system version unpatched versions",
"role": "vulnerable"
},
{
"name": "the remote kernel exploit",
"role": "vulnerability"
}
]
}
]
}
},
{
"id": "see_00459",
"input": {
"audio_file": "train-459.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "tricks",
"type": "phishing",
"arguments": [
{
"name": "criminals",
"role": "attacker"
},
{
"name": "consumers",
"role": "victim"
},
{
"name": "pattern click on a link",
"role": "attack"
},
{
"name": "fake news",
"role": "tool"
},
{
"name": "entity digital trust",
"role": "trusted"
}
]
}
]
}
},
{
"id": "see_00160",
"input": {
"audio_file": "train-160.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "demanding ransoms",
"type": "ransom",
"arguments": [
{
"name": "method in the cryptocurrency bitcoin",
"role": "payment"
},
{
"name": "government ministries",
"role": "victim"
},
{
"name": "banks",
"role": "victim"
},
{
"name": "other important infrastructure",
"role": "victim"
},
{
"name": "companies nationwide",
"role": "victim"
},
{
"name": "government employees",
"role": "victim"
},
{
"name": "utilities",
"role": "victim"
},
{
"name": "hacks",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00276",
"input": {
"audio_file": "train-276.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability start deployment",
"type": "patch",
"arguments": [
{
"name": "end of the month",
"role": "time"
},
{
"name": "system Moto G4",
"role": "vulnerable"
},
{
"name": "patch",
"role": "patch"
}
]
}
]
}
},
{
"id": "see_00443",
"input": {
"audio_file": "train-443.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "demands",
"type": "ransom",
"arguments": [
{
"name": "hackers",
"role": "attacker"
},
{
"name": "Disney",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00191",
"input": {
"audio_file": "train-191.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach data breaches",
"type": "data",
"arguments": [
{
"name": "banks",
"role": "victim"
},
{
"name": "2016",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00385",
"input": {
"audio_file": "train-385.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "a ransom was paid",
"type": "ransom",
"arguments": [
{
"name": "hackers",
"role": "attacker"
},
{
"name": "pattern threatening to release one of the studio \u2019s movies",
"role": "attack"
},
{
"name": "Walt Disney",
"role": "victim"
},
{
"name": "CEO Bob Iger",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00293",
"input": {
"audio_file": "train-293.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach leaked",
"type": "data",
"arguments": [
{
"name": "they",
"role": "attacker"
},
{
"name": "Netflix",
"role": "victim"
},
{
"name": "data show",
"role": "compromised"
},
{
"name": "hackers",
"role": "attacker"
},
{
"name": "data content",
"role": "compromised"
},
{
"name": "networks",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00413",
"input": {
"audio_file": "train-413.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach were dumped",
"type": "data",
"arguments": [
{
"name": "data password",
"role": "compromised"
},
{
"name": "user",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00343",
"input": {
"audio_file": "train-343.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability said",
"type": "discover",
"arguments": [
{
"name": "Appthority",
"role": "discoverer"
},
{
"name": "a data security issue",
"role": "vulnerability"
},
{
"name": "attacks can quickly escalate",
"role": "capabilities"
},
{
"name": "brute force attack",
"role": "capabilities"
},
{
"name": "personal information could easily be leveraged",
"role": "capabilities"
}
]
}
]
}
},
{
"id": "see_00257",
"input": {
"audio_file": "train-257.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "attacks",
"type": "ransom",
"arguments": [
{
"name": "hackers",
"role": "attacker"
},
{
"name": "pattern threatened to release a company \u2019s intellectual property",
"role": "attack"
},
{
"name": "Recent months",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00308",
"input": {
"audio_file": "train-308.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach leaked",
"type": "data",
"arguments": [
{
"name": "data PII",
"role": "compromised"
},
{
"name": "apps",
"role": "victim"
},
{
"name": "data passwords",
"role": "compromised"
},
{
"name": "data location",
"role": "compromised"
},
{
"name": "data payment details",
"role": "compromised"
},
{
"name": "data retail customer data",
"role": "compromised"
},
{
"name": "data phone numbers",
"role": "compromised"
},
{
"name": "data emails",
"role": "compromised"
},
{
"name": "data VPN PINs",
"role": "compromised"
},
{
"name": "employees",
"role": "victim"
},
{
"name": "data corporate profile data",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00149",
"input": {
"audio_file": "train-149.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "demanded a payment",
"type": "ransom",
"arguments": [
{
"name": "The new ransom note",
"role": "tool"
},
{
"name": "100 Bitcoins",
"role": "price"
},
{
"name": "$ 340,000",
"role": "price"
},
{
"name": "the Petya / Goldeneye malware",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00130",
"input": {
"audio_file": "train-130.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "trick",
"type": "phishing",
"arguments": [
{
"name": "Cybercriminals",
"role": "attacker"
},
{
"name": "people",
"role": "victim"
},
{
"name": "providing bank details",
"role": "purpose"
},
{
"name": "pay for a fake WhatsApp subscription",
"role": "purpose"
}
]
}
]
}
},
{
"id": "see_00151",
"input": {
"audio_file": "train-151.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "paid",
"type": "ransom",
"arguments": [
{
"name": "victims",
"role": "victim"
},
{
"name": "$ 13,000",
"role": "price"
},
{
"name": "method Bitcoin transactions",
"role": "payment"
},
{
"name": "creators",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00359",
"input": {
"audio_file": "train-359.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability found",
"type": "discover",
"arguments": [
{
"name": "SQL injection flaw",
"role": "vulnerability"
},
{
"name": "hack took place",
"role": "capabilities"
},
{
"name": "Cipher0007",
"role": "discoverer"
}
]
}
]
}
},
{
"id": "see_00099",
"input": {
"audio_file": "train-99.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability has resolved",
"type": "patch",
"arguments": [
{
"name": "11 security flaws",
"role": "vulnerability"
},
{
"name": "patch update",
"role": "patch"
},
{
"name": "Adobe",
"role": "releaser"
},
{
"name": "last month",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00372",
"input": {
"audio_file": "train-372.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach unauthorized access",
"type": "data",
"arguments": [
{
"name": "data data",
"role": "compromised"
},
{
"name": "US",
"role": "place"
},
{
"name": "Today",
"role": "time"
},
{
"name": "OneLogin",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00087",
"input": {
"audio_file": "train-87.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "phishing campaigns",
"type": "phishing",
"arguments": [
{
"name": "The school",
"role": "attacker"
}
]
}
]
}
},
{
"id": "see_00458",
"input": {
"audio_file": "train-458.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "WannaCry attack",
"type": "ransom",
"arguments": []
}
]
}
},
{
"id": "see_00330",
"input": {
"audio_file": "train-330.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability disclose",
"type": "discover",
"arguments": [
{
"name": "we",
"role": "discoverer"
},
{
"name": "Unit 42",
"role": "discoverer"
}
]
}
]
}
},
{
"id": "see_00214",
"input": {
"audio_file": "train-214.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach compromising",
"type": "data",
"arguments": [
{
"name": "FIN10",
"role": "attacker"
},
{
"name": "networks",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00466",
"input": {
"audio_file": "train-466.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "paying",
"type": "ransom",
"arguments": [
{
"name": "victims",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00121",
"input": {
"audio_file": "train-121.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "created",
"type": "phishing",
"arguments": [
{
"name": "the crooks",
"role": "attacker"
},
{
"name": "the fake login pages",
"role": "tool"
}
]
}
]
}
},
{
"id": "see_00499",
"input": {
"audio_file": "train-499.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "payments",
"type": "ransom",
"arguments": [
{
"name": "Saturday",
"role": "time"
},
{
"name": "method ransomware - associated wallets",
"role": "payment"
},
{
"name": "92 bitcoin",
"role": "price"
},
{
"name": "$ 26,407.85 USD",
"role": "price"
}
]
}
]
}
},
{
"id": "see_00020",
"input": {
"audio_file": "train-20.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability reported",
"type": "discover",
"arguments": [
{
"name": "ZDNet",
"role": "discoverer"
},
{
"name": "bug",
"role": "vulnerability"
},
{
"name": "KRACK",
"role": "vulnerability"
},
{
"name": "Key Reinstallation Attack",
"role": "vulnerability"
},
{
"name": "flaw",
"role": "vulnerability"
},
{
"name": "system Wi - Fi Protected Access II ( WPA2 )",
"role": "vulnerable"
}
]
}
]
}
},
{
"id": "see_00188",
"input": {
"audio_file": "train-188.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "make the final payment",
"type": "ransom",
"arguments": [
{
"name": "all the servers",
"role": "victim"
},
{
"name": "The company",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00071",
"input": {
"audio_file": "train-71.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability have patched",
"type": "patch",
"arguments": [
{
"name": "A typical bank",
"role": "releaser"
},
{
"name": "this critical vulnerability",
"role": "vulnerability"
},
{
"name": "a few days",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00106",
"input": {
"audio_file": "train-106.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability resolved",
"type": "patch",
"arguments": [
{
"name": "five bugs",
"role": "vulnerability"
},
{
"name": "system Adobe Flash",
"role": "vulnerable"
},
{
"name": "The vulnerabilities",
"role": "vulnerability"
}
]
}
]
}
},
{
"id": "see_00270",
"input": {
"audio_file": "train-270.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability fix",
"type": "patch",
"arguments": [
{
"name": "Motorola",
"role": "releaser"
},
{
"name": "patches",
"role": "patch"
},
{
"name": "vulnerability",
"role": "vulnerability"
},
{
"name": "system devices",
"role": "vulnerable"
},
{
"name": "this month",
"role": "time"
}
]
}
]
}
},
{
"id": "see_00348",
"input": {
"audio_file": "train-348.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach leaks",
"type": "data",
"arguments": [
{
"name": "data first name",
"role": "compromised"
},
{
"name": "data last initial",
"role": "compromised"
},
{
"name": "data city and purchase data",
"role": "compromised"
},
{
"name": "online shoppers",
"role": "victim"
}
]
}
]
}
},
{
"id": "see_00435",
"input": {
"audio_file": "train-435.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "breach breach",
"type": "data",
"arguments": [
{
"name": "data email addresses",
"role": "compromised"
}
]
}
]
}
},
{
"id": "see_00102",
"input": {
"audio_file": "train-102.wav",
"prompt": "extract the speech events in the given audio"
},
"output": {
"text": [
{
"trigger": "vulnerability issued",
"type": "patch",
"arguments": [
{
"name": "a security update",
"role": "patch"
},
{
"name": "Adobe",
"role": "releaser"
},
{
"name": "July",
"role": "time"
}
]
}
]
}
}
]
}