Understanding Advanced Persistent Threats: A Case Study