Is There Life After Death ?
After compromising an infrastructure, web app, what is next ?
The MITRE ATT&CK resource is a good starting point. The end result of the attack will look a bit different based on the goal of the bad actor. The goal might be to :
Steal sensitive company/client/employee information, ransom, breaking/DoS applications,
Defacement for financial/reputation loss.
Regardless of the goal, I would start with discovery if I'm already inside the infrastructure/app.
This would allow me to check what other systems are within the infrastructure (and later try to exploit them).
For the app :
I would check what data it has/gathers.