This document provides an overview of time-based versioning concepts for modeling cyber threat intelligence. It describes separating structure from state to independently version each, and introducing identity nodes, state nodes, and time-stamped relationships to track changes to state and structure over time. Examples demonstrate adding, updating, and querying nodes and relationships at different points in time.