Has any technical data been captured? (IP addresses, machine names, user names, …)

Any steps taken so far? Analyses? Containment?