In the current threat environment, rapid communication of pertinent threat information is the key to quickly detecting, responding and containing targeted attacks. OpenIOC is designed to fill a void that currently exists for organizations that want to share threat information both internally and externally in a machine-digestible format. OpenIOC is an extensible XML schema that enables you to describe the technical characteristics that identify a known threat, an attacker’s methodology, or other evidence of compromise.

OpenIOC was originally designed to enable MANDIANT’s products to codify intelligence in order to rapidly search for potential security breaches. Now, in response to requests from across the user community, MANDIANT has standardized and open sourced the OpenIOC schema and is releasing tools and utilities to allow communication of threat information at machine speed.

Why OpenIOC?

Sophisticated Indicators

Traditional methods of identifying security breaches no longer work. Simple signatures are too easy for an intruder to circumvent. Organizations need to be able to communicate how to find attackers on their networks and hosts using a machine digestible format that removes human delay from intelligence sharing.

Advanced Threat Detection

By using the OpenIOC framework, you will have the most advanced threat detection capability available. By joining the OpenIOC community, your organization can benefit from the network effect of threat intelligence from organizations within your industry, as well as global Fortune 1000 companies.

Extendable & Customizable

By allowing for extensions and customization, OpenIOC offers your organization the option of using MANDIANT’s field tested Indicators of Compromise, as well as creating your own custom sets of indicators, and any combination thereof that you need to complete your mission.

The Framework Schema

It's Really Simple

The base OpenIOC schema is a simple framework that is written in XML to document and categorize forensic artifacts of an intrusion that can be identified on a host or network. You can easily extend the base schema to include additional indicators from a variety of sources.

Mandiant Indicators

OpenIOC ships with a base set of indicators provided by MANDIANT. These indicators describe over 500 facets of environments that can be used to track down advanced attackers, which have been vetted through years of MANDIANT’s experience responding to some of the world’s largest and most sophisticated computer attacks.


Every environment is different, and you may find custom needs that your environment, market sector, or industry has that are not included in the base set of IOC terms. You are free to create and add your own sets of indicators and extend OpenIOC as you see fit.

Get The Tools

IOC Editor

Following MANDIANT’s long tradition of providing free tools, MANDIANT has created the IOC Editor, which allows users to create, edit and compare Indicators of Compromise in XML format.



Redline enables users to conduct investigations and search for Indicators of Compromise on a single host, allowing for everything from testing to finding evil during the course of actual investigations.


Frequently Asked Questions

What is OpenIOC?

What is just an IOC by itself?

How do I get OpenIOC?

How do I use OpenIOC?

How are other people using OpenIOC?

What do you mean by Open Source?

How can I contribute?