It is believed that Elise malware was specifically developed to meet the needs of the attack campaigns. It is a sophisticated tool, including variants with the ability to evade detection in virtual environments, connect to command-and-control servers for additional instructions, and to steal data.
When you have a well-resourced enemy, and most likley backed by a nation-state, they will be able to deploy advanced tools in their attacks. Operation Lotus Blossom is a fine example of this. The tools used for the attacked could ebdeployed over an extended period of time, maybe even years, in order to reach its goals.
Definition
Spearphishing – an email spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential information. These emails seem to come from a trusted source, which attackers hope that users will be convinced of its legitimacy and click the malicious web link contain therein or open the malicious attachment.
Source
Palo Alto Unit 42.