They differ from other types of attack by their careful target selection and stealthy intrusion effors over extended periods.
The intent is to infect that target with sophisticated malware with multiple propagation methods and payloads, and once infected, use a further range of attack tools to maintain and extend their access.