Then, research at least two APTs. Explain how they all meet your definition of an​‌‍‍‍‌‍‍‍‌‍‍‍‌‌‌‌‌‌‍‍​ APT. Say what the APTs that you

 chose have in common and how they differ. What do they do? 

Are there any indications of attribution? Be sure to discuss the motivations and TTPs of the attackers, a

 characterization of the adversaries, the types of attacks they carry out, how covert channels are used to

 communicate back to C&C servers and how, if at all, the perpetrators employ social engineering.

 

 These are some logical questions to get you started.

 Do not just answer them in succession.

 And do not just write a section for each APT. 

Write a graduate-level paper, as outlined above, that integrates your research to answer these questions and any others that you think important​‌‍‍‍‌‍‍‍‌‍‍‍‌‌‌‌‌‌‍‍​.