This document summarizes a presentation about detecting a Chinese advanced persistent threat called WINNTI. The presentation discusses the evolution of WINNTI attacks from 2012 to 2014, describing new techniques used in 2014 including hiding payloads in the Windows registry and altering system management binaries. It provides tips for detecting WINNTI, such as enabling detailed process auditing, monitoring for suspicious commands, and using tools like Sysmon and Log-MD to facilitate malware discovery and investigation.