Use the initial alert as a starting location, then checking for network activity, process activity (including checking for injection), and then looking for names of files, look for activity of specific users that have been identified and then finally identify the IOCs from the data