From 90994e2cc24fde8eba452a67c0bf58f0ca2320f7 Mon Sep 17 00:00:00 2001 From: jimbolya0607 Date: Mon, 25 Feb 2019 10:13:32 -0500 Subject: [PATCH] Update mitre_malware.json --- clusters/mitre_malware.json | 12 +----------- 1 file changed, 1 insertion(+), 11 deletions(-) diff --git a/clusters/mitre_malware.json b/clusters/mitre_malware.json index 4b50c39..25a6a74 100644 --- a/clusters/mitre_malware.json +++ b/clusters/mitre_malware.json @@ -1544,17 +1544,7 @@ ] }, "value": "ELMER" - } - ], - "description": "Name of ATT&CK software", - "type": "mitre-malware", - "uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4", - "version": 2, - "source": "https://github.com/mitre/cti", - "authors": [ - "MITRE" - ], - "name": "WinPot" + }, { "description": "ATM Malware. Automation of all kinds is there to help people with their routine work, make it faster and simpler. Although ATM fraud is a very peculiar sort of work, some cybercriminals spend a lot of effort to automate it. In March 2018, we came across a fairly simple but effective piece of malware named WinPot. It was created to make ATMs by a popular ATM vendor to automatically dispense all cash from their most valuable cassettes. We called it ATMPot.[[Citation: Kaspersky Lab]]", "meta": {