Decoding Suspicious Activities: Key Red Flags In Transaction Monitoring