*Provide a detailed analysis and description of the APT 28. Describe the specific tactics used to gain access to the target(s).
*Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Advanced Persistent Threat Analysis