| { | |
| "set_type": "openset", | |
| "task": "speech event extraction", | |
| "data_source": "SpeechEventExtraction", | |
| "type": "audio comprehension", | |
| "modality": { | |
| "in": [ | |
| "audio", | |
| "text" | |
| ], | |
| "out": "text" | |
| }, | |
| "version": "1.0", | |
| "data_description": "The SpeechEventExtraction dataset is a dataset for speech event extraction. The dataset contains audio recordings of speech events. The task is to extract the speech events in the audio.", | |
| "data": [ | |
| { | |
| "id": "see_00422", | |
| "input": { | |
| "audio_file": "train-422.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "the ransomware attack", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00233", | |
| "input": { | |
| "audio_file": "train-233.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach intercept", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data them", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "anyone", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00311", | |
| "input": { | |
| "audio_file": "train-311.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability said", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "company", | |
| "role": "discoverer" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00164", | |
| "input": { | |
| "audio_file": "train-164.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "demands a payment", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "pattern encrypts files", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "pattern locks infected systems", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "Ransomware", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00136", | |
| "input": { | |
| "audio_file": "train-136.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach steal", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "scammers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "fake emails", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "data credentials", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "university staff", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00197", | |
| "input": { | |
| "audio_file": "train-197.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach hack", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data stolen data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "QNB", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "up for sale", | |
| "role": "purpose" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00258", | |
| "input": { | |
| "audio_file": "train-258.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "blackmail money", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "pattern deciding to leak as - yet unaired episodes", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "Netflix", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "The Dark Overlord hacking group", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "month ago", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00232", | |
| "input": { | |
| "audio_file": "train-232.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach obtain", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data login credentials", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00115", | |
| "input": { | |
| "audio_file": "train-115.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "phishing scam", | |
| "type": "phishing", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00120", | |
| "input": { | |
| "audio_file": "train-120.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "convincing", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "The phishing emails", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00349", | |
| "input": { | |
| "audio_file": "train-349.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "blackmail", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "pattern personal shopper data can be used", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "pattern infer parts of customers \u2019 identities", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00224", | |
| "input": { | |
| "audio_file": "train-224.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransom demand", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Companies", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00402", | |
| "input": { | |
| "audio_file": "train-402.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "was tricked", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "Barclays CEO Jes Staley", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "this month", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00397", | |
| "input": { | |
| "audio_file": "train-397.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach have stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "they", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00127", | |
| "input": { | |
| "audio_file": "train-127.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransom demand", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00285", | |
| "input": { | |
| "audio_file": "train-285.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach steal", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data information", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "router", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern capture the blinking pattern", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00411", | |
| "input": { | |
| "audio_file": "train-411.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "paid up", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "victims", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern promising to hold their end of the decryption bargain", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "attackers", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00107", | |
| "input": { | |
| "audio_file": "train-107.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability have all been patched", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "An out of bounds read flaw", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2018-12824", | |
| "role": "common" | |
| }, | |
| { | |
| "name": "a security bypass error", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2018-12825", | |
| "role": "common" | |
| }, | |
| { | |
| "name": "two information disclosure vulnerabilities", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2018-12826", | |
| "role": "common" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2018-12827", | |
| "role": "common" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2018-12828", | |
| "role": "common" | |
| }, | |
| { | |
| "name": "a privilege escalation flaw", | |
| "role": "vulnerability" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00370", | |
| "input": { | |
| "audio_file": "train-370.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "intruders", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "data customer data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "customers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00325", | |
| "input": { | |
| "audio_file": "train-325.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach exposure", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data cardholder data", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00133", | |
| "input": { | |
| "audio_file": "train-133.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "dupe", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "Scammers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "victims", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern use text messages", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "paying for a fake subscription", | |
| "role": "purpose" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00452", | |
| "input": { | |
| "audio_file": "train-452.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "payments", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Monday", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "method Bitcoin wallets", | |
| "role": "payment" | |
| }, | |
| { | |
| "name": "malware", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00044", | |
| "input": { | |
| "audio_file": "train-44.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach stole", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data site credentials", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "Attacker", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00460", | |
| "input": { | |
| "audio_file": "train-460.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "trick", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "users", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00065", | |
| "input": { | |
| "audio_file": "train-65.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach breaches", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data private financial data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "of victim 143 million", | |
| "role": "number" | |
| }, | |
| { | |
| "name": "consumers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "consumers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Equifax", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00283", | |
| "input": { | |
| "audio_file": "train-283.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach steal", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "router", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "user", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "computer", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00085", | |
| "input": { | |
| "audio_file": "train-85.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "phishing attacks", | |
| "type": "phishing", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00242", | |
| "input": { | |
| "audio_file": "train-242.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach unauthorized access", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data payment card data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "April 18 , 2017", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00186", | |
| "input": { | |
| "audio_file": "train-186.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransomware attack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "$ 28,730", | |
| "role": "price" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00383", | |
| "input": { | |
| "audio_file": "train-383.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data movie", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "Disney", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "companies", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00159", | |
| "input": { | |
| "audio_file": "train-159.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "The attack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Eastern Europe", | |
| "role": "place" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00012", | |
| "input": { | |
| "audio_file": "train-12.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "demands", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "0.05 BTC", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "$ 290", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "the ransomware", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "Bad Rabbit", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "computers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00035", | |
| "input": { | |
| "audio_file": "train-35.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability claim", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "Security researchers", | |
| "role": "discoverer" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00028", | |
| "input": { | |
| "audio_file": "train-28.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability claim", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "Security researchers", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "platform devices", | |
| "role": "supported" | |
| }, | |
| { | |
| "name": "system macOS", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Windows", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system iOS", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Android", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Linux", | |
| "role": "vulnerable" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00170", | |
| "input": { | |
| "audio_file": "train-170.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "charge", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "method in Bitcoin", | |
| "role": "payment" | |
| }, | |
| { | |
| "name": "the victim", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "The actors", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00142", | |
| "input": { | |
| "audio_file": "train-142.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach this leak", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data personal data", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00398", | |
| "input": { | |
| "audio_file": "train-398.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "extort money", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "pattern threatening to make public", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "Disney", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "pattern have been bluffing", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00342", | |
| "input": { | |
| "audio_file": "train-342.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach access", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data PII", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "servers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00221", | |
| "input": { | |
| "audio_file": "train-221.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pay", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "companies", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern systems and networks disrupted", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00095", | |
| "input": { | |
| "audio_file": "train-95.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "were presented", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "victims", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "fake JavaScript", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "pattern redirecting them to affiliate programs", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00051", | |
| "input": { | |
| "audio_file": "train-51.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach a data breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "U.S. companies", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data lost or stolen record", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "June 2017", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "amount $ 7.4 million", | |
| "role": "damage" | |
| }, | |
| { | |
| "name": "amount $ 225", | |
| "role": "damage" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00240", | |
| "input": { | |
| "audio_file": "train-240.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach had been compromised", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "November", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "GameStop.com", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data card", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00484", | |
| "input": { | |
| "audio_file": "train-484.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach were accessed", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data email addresses", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00378", | |
| "input": { | |
| "audio_file": "train-378.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach obtained", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "threat actor", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00178", | |
| "input": { | |
| "audio_file": "train-178.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "extorted", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "These hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "$ 1 million", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "one South Korean company", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00041", | |
| "input": { | |
| "audio_file": "train-41.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability is patched", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "system operating systems", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "the vulnerability", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "system version a beta version", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "Apple", | |
| "role": "releaser" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00498", | |
| "input": { | |
| "audio_file": "train-498.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransom payments", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "weekend", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00421", | |
| "input": { | |
| "audio_file": "train-421.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability disclose", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "a zero - day vulnerability", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "federal government", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "system owner manufacturer", | |
| "role": "vulnerable" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00206", | |
| "input": { | |
| "audio_file": "train-206.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransomware attack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "central London university", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Wednesday", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00282", | |
| "input": { | |
| "audio_file": "train-282.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach extract", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "victim", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "computer", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "router", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern using the LED lights", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00254", | |
| "input": { | |
| "audio_file": "train-254.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "Paying", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "extortionists", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "blackmailers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "company", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00412", | |
| "input": { | |
| "audio_file": "train-412.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "PureMatrimony.com", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Muslim focused site", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "users", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00004", | |
| "input": { | |
| "audio_file": "train-4.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "lures", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "the potential target", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern clicking on the provided URL", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "pattern The scam uses a basic social engineering technique", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00256", | |
| "input": { | |
| "audio_file": "train-256.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach the game stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00448", | |
| "input": { | |
| "audio_file": "train-448.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransom demands", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Netflix", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "April 2017", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "The Dark Overlord", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "a group of hackers", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00100", | |
| "input": { | |
| "audio_file": "train-100.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability impacts", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "The patch release", | |
| "role": "patch" | |
| }, | |
| { | |
| "name": "system Adobe Flash", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Acrobat and Reader", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Experience Manager", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Creative Cloud", | |
| "role": "vulnerable" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00226", | |
| "input": { | |
| "audio_file": "train-226.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data breaches", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "Companies", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00429", | |
| "input": { | |
| "audio_file": "train-429.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "WannaCry attack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "pattern hack exploits the same Microsoft vulnerabilities", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "computers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern infected", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00213", | |
| "input": { | |
| "audio_file": "train-213.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransom demanded", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "5 bitcoins", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "USD 12,344", | |
| "role": "price" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00171", | |
| "input": { | |
| "audio_file": "train-171.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "demand", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "The ransomware", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00098", | |
| "input": { | |
| "audio_file": "train-98.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "had created", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "a convincing copy", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "The attackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "entity real account login page", | |
| "role": "trusted" | |
| }, | |
| { | |
| "name": "entity Google", | |
| "role": "trusted" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00292", | |
| "input": { | |
| "audio_file": "train-292.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach leaked", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "Netflix", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "hacker group", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "end of April", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "data first ten episodes", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00215", | |
| "input": { | |
| "audio_file": "train-215.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach leaked", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data stolen data", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00061", | |
| "input": { | |
| "audio_file": "train-61.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach Data leaks", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "Long Island companies", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00047", | |
| "input": { | |
| "audio_file": "train-47.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach was stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data sensitive customer data", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00032", | |
| "input": { | |
| "audio_file": "train-32.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability released", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "Microsoft", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "the Windows updates", | |
| "role": "patch" | |
| }, | |
| { | |
| "name": "October 10th", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00267", | |
| "input": { | |
| "audio_file": "train-267.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability patches", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "Chinese company", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "system firmware", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system IP camera", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "Fosscam", | |
| "role": "releaser" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00327", | |
| "input": { | |
| "audio_file": "train-327.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach copies", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "malware", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "data credit card information", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "card \u2019s magnetic strip", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00200", | |
| "input": { | |
| "audio_file": "train-200.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach exfiltration", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data financial information", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "pattern install a backdoor", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "pattern gain control of the target businesses \u2019 systems", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00446", | |
| "input": { | |
| "audio_file": "train-446.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pay", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "the attackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "Disney", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00027", | |
| "input": { | |
| "audio_file": "train-27.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability affecting", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "system owner Technology companies", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Wi - Fi networks", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system WPA", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system WPA2", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "a new Wi - Fi exploit", | |
| "role": "vulnerability" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00424", | |
| "input": { | |
| "audio_file": "train-424.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "WannaCry ransomware attacks", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00230", | |
| "input": { | |
| "audio_file": "train-230.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data breaches", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "of data 6 million", | |
| "role": "number" | |
| }, | |
| { | |
| "name": "data accounts", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "CashCrate", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00260", | |
| "input": { | |
| "audio_file": "train-260.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach leaked", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "September 2003", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "German hacker", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data the source code", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "game Half - Life 2", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00288", | |
| "input": { | |
| "audio_file": "train-288.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data exfiltration", | |
| "type": "data", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00162", | |
| "input": { | |
| "audio_file": "train-162.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability made available", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "addressed EternalBlue exploited", | |
| "role": "issues" | |
| }, | |
| { | |
| "name": "the Windows flaw", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "a patch", | |
| "role": "patch" | |
| }, | |
| { | |
| "name": "March", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "Microsoft", | |
| "role": "releaser" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00425", | |
| "input": { | |
| "audio_file": "train-425.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "WannaCry ransomware attacks", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00138", | |
| "input": { | |
| "audio_file": "train-138.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data leak", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "Verizon Communications", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "cloud server", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00062", | |
| "input": { | |
| "audio_file": "train-62.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach had breached", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "stores", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "of victim three", | |
| "role": "number" | |
| }, | |
| { | |
| "name": "data the credit card database", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "foreign hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "2014", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "Uncle Giuseppe", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Farmingdale - based supermarket", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00135", | |
| "input": { | |
| "audio_file": "train-135.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "lure", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "Scammers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "victims", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "handing over their credit card information", | |
| "role": "purpose" | |
| }, | |
| { | |
| "name": "installing malware", | |
| "role": "purpose" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00128", | |
| "input": { | |
| "audio_file": "train-128.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "the attack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "the months", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "method the bitcoin wallets", | |
| "role": "payment" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00476", | |
| "input": { | |
| "audio_file": "train-476.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pay the ransom", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Disney", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00008", | |
| "input": { | |
| "audio_file": "train-8.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "sends out", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "the deceptive messages", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "victim", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00326", | |
| "input": { | |
| "audio_file": "train-326.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach steal", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "company", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "systems", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern were hit with a malware", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "data credit card data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "point - of - sale devices", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00463", | |
| "input": { | |
| "audio_file": "train-463.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "paying the ransom", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "people", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00064", | |
| "input": { | |
| "audio_file": "train-64.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability update", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "system its software", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "Equifax", | |
| "role": "releaser" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00300", | |
| "input": { | |
| "audio_file": "train-300.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach exposed", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "of data 280 million", | |
| "role": "number" | |
| }, | |
| { | |
| "name": "data records", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "of data 163 GB", | |
| "role": "number" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00014", | |
| "input": { | |
| "audio_file": "train-14.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "the latest cyberattack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Bad Rabbit", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00156", | |
| "input": { | |
| "audio_file": "train-156.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransom demands", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "a Russian oil giant", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "a Danish shipping and energy conglomerate", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Ukrainian government ministries", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00040", | |
| "input": { | |
| "audio_file": "train-40.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability patched or unpatched", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "system all their Wi - Fi devices", | |
| "role": "vulnerable" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00379", | |
| "input": { | |
| "audio_file": "train-379.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "identity management firm", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "the single sign - on ( SSO )", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00468", | |
| "input": { | |
| "audio_file": "train-468.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "had paid the ransom", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "individuals", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00403", | |
| "input": { | |
| "audio_file": "train-403.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "a global cyberattack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "One week ago", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00216", | |
| "input": { | |
| "audio_file": "train-216.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "extortion", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "pattern destruction of systems", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "FIN10", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "threat actors", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00279", | |
| "input": { | |
| "audio_file": "train-279.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability had discovered", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "we", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "system Nexus 6", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "Hay", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "May", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "vulnerability", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2016-10277", | |
| "role": "common" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00434", | |
| "input": { | |
| "audio_file": "train-434.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach obtain", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data user emails", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "the malware", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "data the DocuSign database", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "customer", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00430", | |
| "input": { | |
| "audio_file": "train-430.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "extorted", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "the WannaCry hackers", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00337", | |
| "input": { | |
| "audio_file": "train-337.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "extortion", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "MongoDB", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Hadoop", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "CouchDB", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "pattern scanning for vulnerable servers to attack", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00236", | |
| "input": { | |
| "audio_file": "train-236.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data three - digit card verification values ( CVV2 )", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data addresses", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data names", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data expiration dates", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data card numbers", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data bankcard data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "GameStop", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "online customers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data credit card", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00207", | |
| "input": { | |
| "audio_file": "train-207.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "Ransomware attacks", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "computer systems", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern are locked and threatened with damaging software", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00212", | |
| "input": { | |
| "audio_file": "train-212.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "paid", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00295", | |
| "input": { | |
| "audio_file": "train-295.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability report", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "Appthority", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "cloud back - end security vulnerabilities", | |
| "role": "vulnerability" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00457", | |
| "input": { | |
| "audio_file": "train-457.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "payment", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "three days", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "seven days", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "pattern the files would be lost forever", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "users", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00251", | |
| "input": { | |
| "audio_file": "train-251.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach have stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data files", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "company", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "CD Projekt Red", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data documents", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "extortionists", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00488", | |
| "input": { | |
| "audio_file": "train-488.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "were hit", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00486", | |
| "input": { | |
| "audio_file": "train-486.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "looks like", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "entity DocuSign", | |
| "role": "trusted" | |
| }, | |
| { | |
| "name": "email", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "pattern clicking a link", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "the message", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00303", | |
| "input": { | |
| "audio_file": "train-303.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "ransomware attacks", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "MongoDB databases", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Elasticsearch servers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "earlier this year", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00350", | |
| "input": { | |
| "audio_file": "train-350.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "duped", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "Web users", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "entering their username and passwords", | |
| "role": "purpose" | |
| }, | |
| { | |
| "name": "fake websites", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00269", | |
| "input": { | |
| "audio_file": "train-269.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability said", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "Aleph Research", | |
| "role": "discoverer" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00201", | |
| "input": { | |
| "audio_file": "train-201.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "is well - tailored", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "pattern malicious Word document attached", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "phishing email", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "business", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00161", | |
| "input": { | |
| "audio_file": "train-161.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability discovered", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "a weakness", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "the NSA", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "years ago", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "the vulnerability", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "exploited by Petya", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "turned into a hacking tool", | |
| "role": "capabilities" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00043", | |
| "input": { | |
| "audio_file": "train-43.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach has gained access", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "attacker", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "the infrastructure hosting its website", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Forrester.com", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "attackers", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00217", | |
| "input": { | |
| "audio_file": "train-217.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pay a hefty ransom", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "networks", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "systems", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "North American companies", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern threatening to leak the stolen information", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "company", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern disrupting their networks", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00401", | |
| "input": { | |
| "audio_file": "train-401.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pay a ransom", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "the streaming giant", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00190", | |
| "input": { | |
| "audio_file": "train-190.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach selling", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "Hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "data stolen data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "UAE InvestBank", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Qatar National Bank ( QNB )", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00309", | |
| "input": { | |
| "audio_file": "train-309.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach been accessed", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "unauthorized individuals", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00259", | |
| "input": { | |
| "audio_file": "train-259.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach published", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "hacking group", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "of data 180,000", | |
| "role": "number" | |
| }, | |
| { | |
| "name": "data medical records", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data insurance and social security numbers", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data dates of birth", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data payment information", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00105", | |
| "input": { | |
| "audio_file": "train-105.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability says", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "The tech giant", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "an out of bounds write issue", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "the security flaws", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "an untrusted pointer dereference problem", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2018-12799", | |
| "role": "common" | |
| }, | |
| { | |
| "name": "lead to arbitrary code execution", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "vulnerabilities and exposures CVE -2018-12808", | |
| "role": "common" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00053", | |
| "input": { | |
| "audio_file": "train-53.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach was exposed", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data birth dates", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data Social Security numbers", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data sensitive data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "of victim 143 million", | |
| "role": "number" | |
| }, | |
| { | |
| "name": "consumers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00389", | |
| "input": { | |
| "audio_file": "train-389.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data a movie", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00001", | |
| "input": { | |
| "audio_file": "train-1.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "the scam", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "steal personal and credit card information", | |
| "role": "purpose" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00441", | |
| "input": { | |
| "audio_file": "train-441.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "asked to be paid", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "pattern release the stolen information", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00482", | |
| "input": { | |
| "audio_file": "train-482.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "send", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "malicious third party", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "customers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "users", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "the messages", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00049", | |
| "input": { | |
| "audio_file": "train-49.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach gain access", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "scam artists", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "data member accounts", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "pattern through phishing emails", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "defraud other members", | |
| "role": "purpose" | |
| }, | |
| { | |
| "name": "eBay", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00419", | |
| "input": { | |
| "audio_file": "train-419.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability put out", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "Microsoft", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "immediate patch", | |
| "role": "patch" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00080", | |
| "input": { | |
| "audio_file": "train-80.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "look like", | |
| "type": "phishing", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00205", | |
| "input": { | |
| "audio_file": "train-205.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "\" ransomware \" attack", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "NHS computer systems", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "university", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "last month", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00034", | |
| "input": { | |
| "audio_file": "train-34.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability receive", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "system Pixel devices", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "November 6 , 2017", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "Google", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "fixes", | |
| "role": "patch" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00263", | |
| "input": { | |
| "audio_file": "train-263.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability are riddled", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "security flaws", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "system owner Chinese vendor Fosscam", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system IP cameras", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "allow an attacker to take over the device", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "penetrate your network", | |
| "role": "capabilities" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00427", | |
| "input": { | |
| "audio_file": "train-427.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "appear to be", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "transfer", | |
| "role": "purpose" | |
| }, | |
| { | |
| "name": "entity Bangladeshi central bank", | |
| "role": "trusted" | |
| }, | |
| { | |
| "name": "amount $ 1 billion", | |
| "role": "damage" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00366", | |
| "input": { | |
| "audio_file": "train-366.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability be exploited", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "The Linux flaw", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "privileges to execute commands", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "allow attackers to escalate their privileges to root", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "system Sudo", | |
| "role": "vulnerable" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00091", | |
| "input": { | |
| "audio_file": "train-91.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "have been phishing", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "Attackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "developers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00339", | |
| "input": { | |
| "audio_file": "train-339.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach accessing", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data company data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data database", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "bad actor", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00473", | |
| "input": { | |
| "audio_file": "train-473.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "extort money", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "the mass media giant", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "the firm", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern threatening to release a film", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00052", | |
| "input": { | |
| "audio_file": "train-52.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data breaches", | |
| "type": "data", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00345", | |
| "input": { | |
| "audio_file": "train-345.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach were exposed and leaked", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data Pulse customer data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data data records", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "app", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Pulse Workspace", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00264", | |
| "input": { | |
| "audio_file": "train-264.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability published", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "findings", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "Finnish cyber-security firm F - Secure", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "yesterday", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "issues", | |
| "role": "vulnerability" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00241", | |
| "input": { | |
| "audio_file": "train-241.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach have been obtained", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "unauthorized individuals", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "www.GameStop.com", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data data from payment card", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00013", | |
| "input": { | |
| "audio_file": "train-13.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pretends to be", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "entity an Adobe Flash installer", | |
| "role": "trusted" | |
| }, | |
| { | |
| "name": "the malware dropper", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "the victim", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00315", | |
| "input": { | |
| "audio_file": "train-315.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "WannaCry damage", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "machines", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "Windows 7", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "EternalBlue", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "Windows 10", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00088", | |
| "input": { | |
| "audio_file": "train-88.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "phishing attempts", | |
| "type": "phishing", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00387", | |
| "input": { | |
| "audio_file": "train-387.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach been stolen", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data a movie", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00273", | |
| "input": { | |
| "audio_file": "train-273.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability were still vulnerable", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "system Moto G4 and G5", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "kernel command line injection flaw", | |
| "role": "vulnerability" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00166", | |
| "input": { | |
| "audio_file": "train-166.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "payment demands", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "a few hundred dollars", | |
| "role": "price" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00328", | |
| "input": { | |
| "audio_file": "train-328.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "retail chain", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "2014", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "data stolen data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data personal information", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data customer names", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data emails addresses", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00492", | |
| "input": { | |
| "audio_file": "train-492.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "WannaCrypt attacks", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00134", | |
| "input": { | |
| "audio_file": "train-134.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "receive", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "the email", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "pattern click on any of the links", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00306", | |
| "input": { | |
| "audio_file": "train-306.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data access", | |
| "type": "data", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00480", | |
| "input": { | |
| "audio_file": "train-480.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "was tracking", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "pattern malicious email campaign", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "May 9", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "entity DocuSign", | |
| "role": "trusted" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00319", | |
| "input": { | |
| "audio_file": "train-319.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability are released", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "patches", | |
| "role": "patch" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00243", | |
| "input": { | |
| "audio_file": "train-243.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "customers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00054", | |
| "input": { | |
| "audio_file": "train-54.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "send", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "phishing emails", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "specialized tools", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "cybercriminals", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00363", | |
| "input": { | |
| "audio_file": "train-363.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability reporting", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "hacker", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "a bug", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "system owner AlphaBay staff", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "allowed an attacker access", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "January", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00050", | |
| "input": { | |
| "audio_file": "train-50.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "attract", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "consumers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "entity trusted brand", | |
| "role": "trusted" | |
| }, | |
| { | |
| "name": "entity eBay", | |
| "role": "trusted" | |
| }, | |
| { | |
| "name": "Criminals", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00456", | |
| "input": { | |
| "audio_file": "train-456.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pay", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Users", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00174", | |
| "input": { | |
| "audio_file": "train-174.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "being paid", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "$ 33,000", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "method a Bitcoin wallet", | |
| "role": "payment" | |
| }, | |
| { | |
| "name": "SamSam", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00445", | |
| "input": { | |
| "audio_file": "train-445.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "had demanded", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00189", | |
| "input": { | |
| "audio_file": "train-189.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "Paying ransomware", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00496", | |
| "input": { | |
| "audio_file": "train-496.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "demanded Bitcoin payments", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "The ransomware", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "the victims", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "computers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00187", | |
| "input": { | |
| "audio_file": "train-187.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "already paid", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "$ 1 million", | |
| "role": "price" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00169", | |
| "input": { | |
| "audio_file": "train-169.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "their demands", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00058", | |
| "input": { | |
| "audio_file": "train-58.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "sent out", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "April", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "Northwell", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "phishing emails", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "entity a tax theme", | |
| "role": "trusted" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00048", | |
| "input": { | |
| "audio_file": "train-48.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pretended to be", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "entity the buyer", | |
| "role": "trusted" | |
| }, | |
| { | |
| "name": "pattern hacked into a real user 's account", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "the scammer", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00344", | |
| "input": { | |
| "audio_file": "train-344.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach leaked", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "Pulse Workspace", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "mobile VPN app", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "service providers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "government agencies", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "enterprises", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00235", | |
| "input": { | |
| "audio_file": "train-235.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "this week", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "customers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "GameStop", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00252", | |
| "input": { | |
| "audio_file": "train-252.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "pay the ransom being demanded", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "CD Projekt Red", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "thieves", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "pattern threatening to release the stolen files", | |
| "role": "attack" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00021", | |
| "input": { | |
| "audio_file": "train-21.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability discovered", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "security researcher", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "the flaw", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "decrypt traffic", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "hijack connections", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "perform man - in - the - middle attacks", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "eavesdrop on communication", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "system a WPA2 - enabled device", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "academic Mathy Vanhoef", | |
| "role": "discoverer" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00313", | |
| "input": { | |
| "audio_file": "train-313.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability vulnerable", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "system machines", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "system Window 10", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "flaw", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "system version unpatched versions", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "the remote kernel exploit", | |
| "role": "vulnerability" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00459", | |
| "input": { | |
| "audio_file": "train-459.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "tricks", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "criminals", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "consumers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "pattern click on a link", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "fake news", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "entity digital trust", | |
| "role": "trusted" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00160", | |
| "input": { | |
| "audio_file": "train-160.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "demanding ransoms", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "method in the cryptocurrency bitcoin", | |
| "role": "payment" | |
| }, | |
| { | |
| "name": "government ministries", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "banks", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "other important infrastructure", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "companies nationwide", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "government employees", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "utilities", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "hacks", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00276", | |
| "input": { | |
| "audio_file": "train-276.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability start deployment", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "end of the month", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "system Moto G4", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "patch", | |
| "role": "patch" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00443", | |
| "input": { | |
| "audio_file": "train-443.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "demands", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "Disney", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00191", | |
| "input": { | |
| "audio_file": "train-191.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach data breaches", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "banks", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "2016", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00385", | |
| "input": { | |
| "audio_file": "train-385.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "a ransom was paid", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "pattern threatening to release one of the studio \u2019s movies", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "Walt Disney", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "CEO Bob Iger", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00293", | |
| "input": { | |
| "audio_file": "train-293.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach leaked", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "they", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "Netflix", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data show", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "data content", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "networks", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00413", | |
| "input": { | |
| "audio_file": "train-413.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach were dumped", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data password", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "user", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00343", | |
| "input": { | |
| "audio_file": "train-343.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability said", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "Appthority", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "a data security issue", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "attacks can quickly escalate", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "brute force attack", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "personal information could easily be leveraged", | |
| "role": "capabilities" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00257", | |
| "input": { | |
| "audio_file": "train-257.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "attacks", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "hackers", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "pattern threatened to release a company \u2019s intellectual property", | |
| "role": "attack" | |
| }, | |
| { | |
| "name": "Recent months", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00308", | |
| "input": { | |
| "audio_file": "train-308.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach leaked", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data PII", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "apps", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data passwords", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data location", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data payment details", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data retail customer data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data phone numbers", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data emails", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data VPN PINs", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "employees", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "data corporate profile data", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00149", | |
| "input": { | |
| "audio_file": "train-149.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "demanded a payment", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "The new ransom note", | |
| "role": "tool" | |
| }, | |
| { | |
| "name": "100 Bitcoins", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "$ 340,000", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "the Petya / Goldeneye malware", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00130", | |
| "input": { | |
| "audio_file": "train-130.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "trick", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "Cybercriminals", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "people", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "providing bank details", | |
| "role": "purpose" | |
| }, | |
| { | |
| "name": "pay for a fake WhatsApp subscription", | |
| "role": "purpose" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00151", | |
| "input": { | |
| "audio_file": "train-151.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "paid", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "victims", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "$ 13,000", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "method Bitcoin transactions", | |
| "role": "payment" | |
| }, | |
| { | |
| "name": "creators", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00359", | |
| "input": { | |
| "audio_file": "train-359.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability found", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "SQL injection flaw", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "hack took place", | |
| "role": "capabilities" | |
| }, | |
| { | |
| "name": "Cipher0007", | |
| "role": "discoverer" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00099", | |
| "input": { | |
| "audio_file": "train-99.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability has resolved", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "11 security flaws", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "patch update", | |
| "role": "patch" | |
| }, | |
| { | |
| "name": "Adobe", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "last month", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00372", | |
| "input": { | |
| "audio_file": "train-372.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach unauthorized access", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "US", | |
| "role": "place" | |
| }, | |
| { | |
| "name": "Today", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "OneLogin", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00087", | |
| "input": { | |
| "audio_file": "train-87.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "phishing campaigns", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "The school", | |
| "role": "attacker" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00458", | |
| "input": { | |
| "audio_file": "train-458.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "WannaCry attack", | |
| "type": "ransom", | |
| "arguments": [] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00330", | |
| "input": { | |
| "audio_file": "train-330.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability disclose", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "we", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "Unit 42", | |
| "role": "discoverer" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00214", | |
| "input": { | |
| "audio_file": "train-214.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach compromising", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "FIN10", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "networks", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00466", | |
| "input": { | |
| "audio_file": "train-466.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "paying", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "victims", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00121", | |
| "input": { | |
| "audio_file": "train-121.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "created", | |
| "type": "phishing", | |
| "arguments": [ | |
| { | |
| "name": "the crooks", | |
| "role": "attacker" | |
| }, | |
| { | |
| "name": "the fake login pages", | |
| "role": "tool" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00499", | |
| "input": { | |
| "audio_file": "train-499.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "payments", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "Saturday", | |
| "role": "time" | |
| }, | |
| { | |
| "name": "method ransomware - associated wallets", | |
| "role": "payment" | |
| }, | |
| { | |
| "name": "92 bitcoin", | |
| "role": "price" | |
| }, | |
| { | |
| "name": "$ 26,407.85 USD", | |
| "role": "price" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00020", | |
| "input": { | |
| "audio_file": "train-20.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability reported", | |
| "type": "discover", | |
| "arguments": [ | |
| { | |
| "name": "ZDNet", | |
| "role": "discoverer" | |
| }, | |
| { | |
| "name": "bug", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "KRACK", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "Key Reinstallation Attack", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "flaw", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "system Wi - Fi Protected Access II ( WPA2 )", | |
| "role": "vulnerable" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00188", | |
| "input": { | |
| "audio_file": "train-188.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "make the final payment", | |
| "type": "ransom", | |
| "arguments": [ | |
| { | |
| "name": "all the servers", | |
| "role": "victim" | |
| }, | |
| { | |
| "name": "The company", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00071", | |
| "input": { | |
| "audio_file": "train-71.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability have patched", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "A typical bank", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "this critical vulnerability", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "a few days", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00106", | |
| "input": { | |
| "audio_file": "train-106.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability resolved", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "five bugs", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "system Adobe Flash", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "The vulnerabilities", | |
| "role": "vulnerability" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00270", | |
| "input": { | |
| "audio_file": "train-270.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability fix", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "Motorola", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "patches", | |
| "role": "patch" | |
| }, | |
| { | |
| "name": "vulnerability", | |
| "role": "vulnerability" | |
| }, | |
| { | |
| "name": "system devices", | |
| "role": "vulnerable" | |
| }, | |
| { | |
| "name": "this month", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00348", | |
| "input": { | |
| "audio_file": "train-348.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach leaks", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data first name", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data last initial", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "data city and purchase data", | |
| "role": "compromised" | |
| }, | |
| { | |
| "name": "online shoppers", | |
| "role": "victim" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00435", | |
| "input": { | |
| "audio_file": "train-435.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "breach breach", | |
| "type": "data", | |
| "arguments": [ | |
| { | |
| "name": "data email addresses", | |
| "role": "compromised" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| }, | |
| { | |
| "id": "see_00102", | |
| "input": { | |
| "audio_file": "train-102.wav", | |
| "prompt": "extract the speech events in the given audio" | |
| }, | |
| "output": { | |
| "text": [ | |
| { | |
| "trigger": "vulnerability issued", | |
| "type": "patch", | |
| "arguments": [ | |
| { | |
| "name": "a security update", | |
| "role": "patch" | |
| }, | |
| { | |
| "name": "Adobe", | |
| "role": "releaser" | |
| }, | |
| { | |
| "name": "July", | |
| "role": "time" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| } | |
| ] | |
| } |