ThreatHunting process- Following files contain list of steps to analyse suspicious event/ threats in network, system and IT infrastructure