This topic focuses on the analysis and research of APT espionage. I will analyze the APT attack tactics of each stage of the kill chain model in the light of the APT espionage investigation experience I encountered in my work. Finally, I will describe a real APT espionage investigation case.