| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
SUPERNOVA has masqueraded as a legitimate SolarWinds DLL.[1][2] |
| Enterprise | T1203 | 客户端执行漏洞利用 |
SUPERNOVA was installed via exploitation of a SolarWinds Orion API authentication bypass vulnerability (CVE-2020-10148).[6][7] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
SUPERNOVA had to receive an HTTP GET request containing a specific set of parameters in order to execute.[1][2] |
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell | |
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File | |