JPCERT/CC Launches YAMAGoya for Real-Time Threat Detection with Sigma and YARA Rule Support

Introducing YAMAGoya: A Cutting-Edge Tool for Real-Time Threat Detection

In the ever-evolving landscape of cybersecurity, the emergence of fileless malware and sophisticated obfuscation techniques presents significant challenges to traditional detection methods. To combat these advanced threats, JPCERT/CC has unveiled YAMAGoya, an open-source threat hunting tool designed to identify suspicious activities in real time by leveraging industry-standard detection rules.

Revolutionizing Endpoint Detection

YAMAGoya marks a significant advancement in endpoint threat detection by integrating Event Tracing for Windows (ETW) event monitoring with comprehensive memory scanning capabilities. Unlike conventional security tools that often rely on proprietary detection engines, YAMAGoya supports Sigma and YARA rules, enabling security analysts to implement community-driven detection logic across their infrastructures.

User-Friendly Deployment

Operating entirely in userland, YAMAGoya eliminates the need for kernel driver installations, simplifying deployment across various organizational environments. Its real-time monitoring capabilities encompass a wide range of activities, including file operations, process executions, registry modifications, DNS queries, network connections, PowerShell executions, and WMI commands. This holistic approach ensures the detection of both traditional and fileless malware threats.

Versatile Rule Support

YAMAGoya’s support for multiple rule formats, such as Sigma rules, YARA rules for memory scanning, and custom YAML rules for correlation-based detection, allows security teams to craft sophisticated detection logic. By correlating multiple events—like file creation followed by process execution, DLL loading, and network communication—analysts can identify complex malicious activity patterns.

Accessibility and Integration

Available for immediate evaluation through pre-built binaries on GitHub, YAMAGoya also offers its source code for organizations requiring custom builds. The tool provides both graphical and command-line interfaces to accommodate different operational preferences. Users can initiate Sigma rule monitoring or memory scanning with simple commands, provided they have administrative privileges.

Detection alerts generated by YAMAGoya are displayed within the tool’s interface and logged to the Windows Event Log with specific event IDs. This feature facilitates seamless integration with Security Information and Event Management (SIEM) systems, enabling centralized monitoring and alerting across enterprise environments.

Empowering the Cybersecurity Community

By supporting industry-standard detection rules, YAMAGoya democratizes advanced threat detection capabilities. Security researchers and incident responders can now leverage community-developed Sigma and YARA rules without vendor lock-in, enhancing the collective cybersecurity defense posture against emerging threats.