Stately Taurus (China-nexus APT) maintained multi-year persistent access inside Southeast Asian military networks using novel backdoors and living-off-the-land binaries, prioritizing long-term intelligence collection with low operational tempo to suppress detection. No CVEs are associated; mitigation centers on behavioral detection covering the full ATT&CK kill chain including scheduled task and service persistence, LOLBin abuse, and low-volume periodic exfiltration. Organizations with defense, government, or critical infrastructure exposure in or adjacent to Southeast Asia should conduct focused threat hunts aligned to Stately Taurus TTPs published by Palo Alto Networks Unit 42.