goAML Integration for Digital Asset Businesses
A practical integration guide to goAML for VASPs and digital asset businesses: STR and CTR reporting, the XML schema, Pakistan FMU specifics and automation patterns.
PUBLISHED
April 2, 2026
AUTHOR
Bridge Research Team
READ_TIME
12 min read
CATEGORY
Guide
goAML is the software platform, developed by the United Nations Office on Drugs and Crime (UNODC), that a large number of national Financial Intelligence Units (FIUs) use to receive and process suspicious transaction reports, currency transaction reports and related AML filings. For a digital asset business operating in a jurisdiction whose FIU runs goAML — and that includes Pakistan's Financial Monitoring Unit (FMU) — integration with goAML is the mechanical end of the AML reporting obligation. Everything the compliance team investigates, everything the transaction-monitoring system flags and everything a supervisor expects to see filed ends, one way or another, as a goAML submission.
This guide is about the integration problem. It covers what goAML is and where it fits, the distinction between suspicious transaction reports (STRs) and currency transaction reports (CTRs), the goAML XML schema and submission channels, the specific context of Pakistan's FMU, the integration patterns that scale for digital asset businesses, and how an automated goAML pipeline should be designed. It assumes a reader who already understands the broader KYC and AML infrastructure picture and is now focused on the reporting-layer mechanics.
What goAML Is, and Is Not
goAML is a back-office system for FIUs. It provides case management, risk analysis, inter-agency sharing, statistical reporting and a receiving interface for regulated entities to submit reports. Approximately sixty or more FIUs around the world use goAML as their primary reporting and case platform, which makes it the closest thing the AML world has to a common interface with regulated firms.
From a regulated firm's perspective, goAML is the inbound channel to the FIU. It is not the AML regime itself, not the firm's monitoring system, not the policy framework that determines when an STR is filed. Those sit upstream inside the firm. goAML is the protocol and the set of data structures by which the firm's decision to file becomes a formal submission to the FIU.
This framing matters because firms sometimes confuse the two. A vendor that sells "goAML compliance" is selling integration with a reporting interface, not a full AML programme. Conversely, a firm that has a thoughtful AML programme but no goAML pipeline cannot actually discharge its reporting obligations on time. Both pieces have to work.
STRs, CTRs and the Data Structures Underneath
The two most common reports in scope are the Suspicious Transaction Report (STR) and the Currency Transaction Report (CTR). Jurisdictions differ on exact nomenclature — some use Suspicious Activity Report (SAR) rather than STR — and on the threshold rules that trigger a CTR, but the structural distinction is stable.
An STR is filed when a regulated firm has reasonable grounds to suspect that a transaction, a pattern of transactions or a customer relationship is connected to money laundering, terrorist financing or other predicate offences. The trigger is subjective, in the sense that it depends on the firm's judgement about what is reasonable under the circumstances, but the process is disciplined: monitoring systems raise alerts, compliance analysts investigate, a money laundering reporting officer (MLRO) or equivalent approves the filing decision, and an STR is submitted. The substance of the report is narrative (what the firm suspected and why) plus structured data (customer, transactions, counterparties, amounts, dates).
A CTR is a rule-based report triggered by transactions above a defined currency threshold. The threshold and the trigger are set by the FIU rather than by the firm, and the obligation is mechanical rather than judgemental. For digital asset businesses, specific reporting categories may apply — Pakistan, under the Virtual Assets Act 2026, is expected to develop reporting structures that capture on-chain as well as fiat activity — and a VASP should assume that its reporting profile will include both.
Both reports ultimately resolve into goAML XML. The schema defines entities (persons, accounts, transactions, reports), relationships between them and metadata (dates, branch, reporting officer). It is strict: a submission that does not validate against the schema is rejected. A significant share of goAML integration work is not about deciding what to report; it is about ensuring that the reported data is structurally valid, internally consistent and populated in every field the receiving FIU requires.
The goAML XML Schema and Submission Channels
goAML submissions are XML documents conforming to a schema published by UNODC and, typically, extended by the receiving FIU with jurisdiction-specific elements. The core schema defines a report envelope, a reporting entity, one or more transactions or activities, and the involved parties (accounts, persons, companies, wallets). Each element has specific data requirements — full name, date of birth, address, identification document, tax identification — and the level of required completeness generally scales with the severity of the report.
Submission channels vary by FIU but typically include a web portal for manual filings, a batch upload endpoint for structured file submissions, and, in some jurisdictions, a web-service API for machine-to-machine submission. A high-volume regulated firm should expect to use the batch or web-service channel rather than the portal, because manual filing scales poorly and produces data-entry errors that become supervisory findings.
The integration challenge for a digital asset business is that the goAML schema was designed around traditional banking transactions — accounts, branches, wires — and mapping on-chain activity into the schema requires deliberate design. Wallet addresses, token identifiers, chain references, smart-contract counterparties and cross-chain bridges do not have direct analogues in the original schema. FIUs have extended the schema to capture virtual asset transactions, but the extensions vary by jurisdiction and sometimes by specific report type. A firm operating in multiple jurisdictions has to maintain jurisdiction-specific transformation logic.
Pakistan's FMU and the Local goAML Context
Pakistan's Financial Monitoring Unit (FMU), established under the Anti-Money Laundering Act 2010 and subsequent amendments, is the national FIU and operates goAML as its receiving platform. Regulated financial institutions, designated non-financial businesses and professions (DNFBPs), and — with the Virtual Assets Act 2026 — licensed VASPs are required to file STRs and applicable CTRs to the FMU through goAML.
For a VASP operating under a PVARA licence, the reporting obligation to the FMU is independent of the licensing and supervisory relationship with PVARA. PVARA supervises the firm; the FMU receives the firm's AML reports. A single reportable event may require both a goAML submission to the FMU and a notification to PVARA depending on the event type. A firm's compliance function should maintain a clear policy that maps each reportable event to the relevant channel and produces both submissions where both are required.
The FMU publishes guidance on STR substance, CTR thresholds and reporting deadlines. A firm's compliance team should track the guidance actively; reporting threshold changes and new report categories are introduced from time to time and late alignment produces supervisory findings. For VASPs specifically, the FMU's evolving guidance on virtual asset reporting should be integrated into the firm's reporting playbook rather than retrofitted after the fact.
Integration Patterns for Digital Asset Businesses
A production goAML pipeline for a digital asset business has several distinct components.
The monitoring and alerting layer — which is not specific to goAML but feeds into it — produces alerts when transactions or patterns cross defined thresholds. Alerts are triaged by compliance analysts, with the MLRO or deputy making filing decisions on escalated cases. A well-designed monitoring stack produces alert volumes calibrated to the team's capacity; over-firing produces alert fatigue and missed cases.
The case management layer records the investigation. For each alert, who looked at it, what they found, what they decided and what the supporting evidence was. A goAML submission should be linkable back to the case file, so that a supervisor asking "why did you file this" or "why did you not file this" has an immediate answer.
The report generation layer transforms case data into goAML XML. This is where the bulk of the integration work sits. The transformation has to draw from the customer record (identity, address, identification documents), the transaction record (amounts, dates, counterparties, wallet addresses, chain references), the case record (the analyst's narrative, the supporting evidence) and any schema extensions applicable in the jurisdiction. Validation against the schema has to happen before submission, because a rejected submission at the FIU endpoint is worse than a delayed one.
The submission and acknowledgement layer submits the report, records the acknowledgement from the FIU, and updates the case file with the submission reference and status. A firm should expect occasional rejections — schema validation failures, data-consistency issues flagged by the FIU, format changes — and should have a remediation path rather than an ad hoc response.
The reporting and audit layer produces internal and external reports: monthly submission statistics to the MLRO, regulatory returns where applicable, audit-trail evidence for inspections. Every submitted report, every rejection, every remediation and every decision should be recoverable from this layer on demand.
Bridge's compliance infrastructure is designed around this pipeline, with the report generation layer configurable per jurisdiction (FMU schema extensions for Pakistan, comparable extensions for Gulf FIUs) and the submission layer supporting batch and web-service channels.
Data Quality and the Upstream Dependency
The quality of goAML submissions depends on the quality of upstream data. An STR that is missing the customer's date of birth, or that has an ambiguous counterparty reference, or that reports a transaction amount inconsistent with the ledger, is a submission that produces FIU pushback and supervisory follow-up. The integration work is visible; the data-quality work is invisible and is what determines whether submissions are credible.
Three upstream systems are consistently the ones that matter. KYC: the customer identity record has to be complete, verified and current. Our NADRA-backed KYC service is designed to produce records that feed directly into goAML fields. Ledger: transaction records must be accurate, reconcilable with on-chain history and immutable. Screening: sanctions, PEP and adverse-media outcomes must be recorded against the customer in a way that ties them to the reporting date.
Firms that underinvest in these upstream systems produce goAML pipelines that are technically functional but substantively weak. The pipeline submits; the submissions are thin; the FIU notices; supervisors notice. Upstream data quality is the single largest determinant of whether a goAML integration performs at the supervisory bar.
Automation: What to Automate and What Not To
Automation has a place in goAML integration, but the places where automation is appropriate are narrower than vendor marketing suggests.
Appropriate automation targets include: the mechanical generation of the XML envelope and structured data from case records; the validation of submissions against the schema before they leave the firm; the transmission to the FIU endpoint and the reconciliation of acknowledgements; the aggregation of submission statistics; the enforcement of filing deadlines (alerting the MLRO when a case has been open past the policy threshold); and the maintenance of the audit trail.
Inappropriate automation targets include the filing decision itself (whether to file an STR is a human judgement that an MLRO takes accountability for), the narrative construction (a narrative that reads like it was produced by a template will not read like it was produced by a thoughtful analyst), the triage of alerts beyond rules-based prioritisation (analyst review is the core value), and the classification of reportable versus non-reportable activity (which requires case-specific judgement).
The right framing is that automation handles the mechanics and humans handle the judgement. Firms that reverse this — automating the judgement and leaving the mechanics manual — produce low-quality filings at high volume. The supervisory perception of such a firm is that it is generating reports rather than producing intelligence, which is the exact inverse of what the FIU relationship is supposed to be.
Handling the VASP-Specific Cases
Digital asset businesses have reporting cases that do not map cleanly into the traditional AML reporting playbook.
On-chain tainting: a customer receives a deposit that analytics attribute to a sanctioned entity or a known mixer. The firm needs to file promptly and the submission has to capture the on-chain chain-of-custody evidence rather than just the narrative.
Unhosted-wallet activity: a customer sends to or receives from a wallet that cannot be attributed. The firm's Travel Rule position, documented in our Travel Rule architecture guide, feeds the reporting decision; the goAML submission should capture the firm's attribution attempt and its outcome.
Cross-chain bridge activity: a customer moves assets between chains via a bridge. The submission should trace the activity across chains rather than reporting only the leg the firm directly observed.
Smart-contract counterparties: a transaction destination is a contract rather than a wallet. The submission should classify the contract (DEX, lending protocol, mixer, other) and the purpose of the activity. Vague "sent to a contract" entries in the submission are not useful to the FIU.
A digital asset business should develop a reporting playbook that explicitly covers these cases, with example narratives, data-field mappings and escalation paths. Supervisors expect a playbook; they do not expect the firm to improvise on each case.
Talk to Bridge About goAML and AML Reporting
Bridge Intelligence operates goAML-aligned compliance infrastructure across its Pakistan footprint and in the Gulf. The reporting pipeline is built into the identity and compliance platform and connects to the custody and ledger layers for end-to-end data quality. For firms operating under PVARA or preparing for it, goAML readiness is part of the broader compliance file. To discuss your reporting architecture, reach out via our contact page.