Study a minimum of six published threat intelligence reports on APT29 activity. - Create a TTP profile documenting APT29's preferred techniques across all ATT&CK tactics. - Identify patterns: What does APT29 do first upon gaining access? How do they move laterally? What are their primary objectives