Phantom is mainly used to automate repetitive tasks. for example: if you have correlation search in Splunk that alerts when phishing email is found. in general scenarios, analyst will follow incident playbook to perform actions in response to phishing alert. The list of actions purely based on how incident can be properly handled, below are the just examples: identifying list of recipients who received phishing email identifying list of users who clicked on phishing link using proxy logs notifying users that they received phishing email with subject "what ever it is" changing password of users sharing of new passwords to the users. and also, find more use case here https://www.splunk.com/en_us/blog/security/playbooks-going-beyond-incident-response-use-cases.html
... View more