The present document provides an overview on the means for describing and exchanging cyber threat information in a standardized and structured manner. Such information includes technical indicators of adversary activity@ contextual information@ exploitation targets@ and courses of action. The existence and creation of organizations for the exchange of this information are out of scope the present document