AML

goAML Typology Codes: Definition and Use in Compliance

Published: Last updated:

goAML Typology Codes is a standardized set of classification identifiers embedded in the UNODC goAML reporting platform that categorizes suspicious transaction reports by recognized money laundering or financial crime method for analysis by Financial Intelligence Units.

What is goAML Typology Codes?

goAML Typology Codes are a structured set of classification identifiers built into the goAML platform, the financial intelligence reporting system developed by the United Nations Office on Drugs and Crime (UNODC). Each code maps to a specific money laundering method or financial crime pattern recognized in international typology research, from basic cash structuring to professional laundering networks that span multiple jurisdictions.

The platform was built to help Financial Intelligence Units (FIUs) collect, store, analyze, and share financial intelligence. When a bank or other reporting entity submits a Suspicious Transaction Report (STR) through the FIU's goAML portal, the typology code field tells the FIU analyst what criminal method is suspected. Think of it as the crime-type classification that turns a narrative report into searchable, aggregable intelligence.

Codes cover a wide range of activities. A report might carry codes for structuring (breaking large cash transactions into smaller ones to evade reporting thresholds), trade-based money laundering, terrorism financing, real estate abuse, or professional money laundering networks. Multiple codes can appear on a single report. That's how analysts capture complex schemes that use more than one method.

The codes don't replace the narrative in a report. They add a machine-readable label that supports statistical analysis across thousands of filings. An FIU can run a query: how many STRs in Q3 carried the smurfing typology code? Did that number rise after a new gambling operator launched? That kind of pattern recognition isn't possible from free-text narratives alone.

As of 2024, over 60 jurisdictions have deployed goAML, including the UAE, Kenya, Mauritius, and Pakistan. Each jurisdiction may extend the core typology list with locally relevant codes, but the base taxonomy follows FATF-published typology frameworks, which the Financial Action Task Force updates through dedicated research programs. The most current code taxonomy and implementation documentation is maintained by UNODC at unodc.org/unodc/en/money-laundering/goaml.


How is goAML Typology Codes used in practice?

In day-to-day compliance work, typology code selection happens at the point of STR preparation. The compliance analyst or MLRO reviews a suspicious activity flagged by the transaction monitoring system, conducts the investigation, and drafts the report. Choosing the right typology code is part of that drafting process.

It sounds administrative. It's actually consequential.

If an analyst selects "cash structuring" when the scheme is actually a mule network, the FIU's statistical models will undercount network-based laundering in that sector. Aggregate miscoding across hundreds of institutions skews the national typology picture, which in turn affects supervisory priorities and the regulatory guidance issued to the industry.

Most goAML jurisdictions publish a typology code reference guide specific to their FIU. The UAE's Financial Intelligence Unit provides a detailed goAML reporting guide with code definitions and selection criteria. Analysts are expected to match the specific scheme pattern, not just the broadest applicable code.

Where automated transaction monitoring feeds STR drafts, some institutions pre-populate typology codes based on the rule or model that triggered the alert. A rule targeting smurfing behavior might suggest the structuring code automatically. This saves time but requires careful governance: auto-suggested codes should be a starting point, not the final answer. A human reviewer, typically the MLRO, should confirm the code reflects the actual suspected scheme.

Volume is a practical constraint. A bank processing 10,000 alerts per month with a 2-3% STR conversion rate generates 200-300 filings monthly. Without a clear internal coding guide, typology selection becomes inconsistent across analysts. Institutions that have standardized their classification process report materially lower query rates from FIUs on filed reports.

The goAML XML Template is the technical schema that carries typology codes from reporting entity to FIU. The typologies element accepts one or more typology child nodes, each containing the code value. Getting this structure right matters: malformed submissions can be rejected or require manual FIU intervention to process.


goAML Typology Codes in regulatory context

The regulatory foundation for typology codes traces back to FATF, which has published typology reports since 1990. FATF's methodology teams study real cases from member jurisdictions, identify recurring criminal patterns, and publish these as named typologies: funnel accounts, professional money laundering networks, real estate abuse, and others. The goAML typology code list is, in effect, a machine-readable version of this taxonomy.

FATF Recommendation 29 requires countries to establish FIUs capable of analyzing suspicious reports and disseminating financial intelligence. Typology codes are the primary mechanism by which FIUs fulfill the analysis function at scale. Without them, an FIU receiving 50,000 STRs a year is unable to generate the strategic intelligence products that regulators and law enforcement expect.

In jurisdictions with mature goAML deployments, supervisory authorities use typology code distributions to calibrate their examination programs. If the FIU records a 40% year-on-year increase in STRs coded for counter-financing of terrorism, that triggers supervisory attention on sectors where the spike is concentrated. Banks and payment providers in those sectors can expect pointed questions about their typology detection controls.

The Egmont Group's Secure Web platform allows FIUs to share intelligence across borders. Typology codes provide a common language for this sharing. Two FIUs that don't share a common legal framework can still communicate "we're seeing a surge in trade invoice fraud" because both sides recognize the typology code attached to the shared intelligence package. The Egmont Group publishes typology reports and guidance at egmontgroup.org.

From an examination standpoint, regulators in the UAE, Kenya, and other goAML jurisdictions assess whether institutions select appropriate typology codes when filing STRs. An institution that consistently files with generic or imprecise codes may receive examination findings on the quality of its financial intelligence reporting, even if filing volume looks adequate on paper.

FATF's published typology research, available at fatf-gafi.org, is the primary reference for understanding how criminal methods map to typology categories and how the taxonomy evolves over time.


Common challenges and how to address them

The most common problem: analysts default to whichever typology code they've used before, regardless of whether it fits the current scheme. An institution that files 80% of its STRs with the same two or three codes likely has a code selection process driven by habit rather than analysis. FIU feedback letters cite this pattern as a data quality issue, and it can surface during AML examinations as a finding on reporting quality.

A second challenge is that the typology code list evolves. FATF publishes new typology reports regularly, covering areas like cryptocurrency laundering, deepfake fraud, and trade-based schemes. If the FIU updates its goAML code list and an institution hasn't updated its internal reference guide, analysts continue selecting outdated codes that don't accurately capture emerging schemes.

The fix is a structured code maintenance process. Compliance teams should review the FIU's published code list at least annually, update internal guidance, and run analyst training when new codes are added. Building the typology code list directly into the case management system as a dropdown forces analysts to review available options rather than typing a remembered value.

Multi-scheme reporting is a third challenge. Real money laundering operations rarely use one method. A professional laundering network might combine cash deposits, mule accounts, and offshore transfers. The correct approach is to select all applicable codes. Selecting just one when the scheme has multiple components is the error, and training should address it explicitly with worked examples.

Finally, inconsistency across analysts degrades aggregate data quality. Without a written internal typology coding guide with concrete examples, two experienced compliance officers looking at the same case may select different codes. An annual calibration exercise, where a sample of filed STRs is reviewed for coding accuracy by a senior analyst or the MLRO, addresses this systematically and is straightforward to document as a control for examiners.


Related terms and concepts

goAML Typology Codes sit at the intersection of several related compliance concepts.

Transaction monitoring is where suspicious patterns first surface. The alert describes behaviors: rapid fund movements across multiple accounts, repeated below-threshold deposits, or unusual counterparty patterns. The typology code translates that behavioral description into the regulatory language of financial crime classification. Monitoring catches the signal; typology coding labels what the signal represents.

The broader concept of a typology is the parent category. A typology is a documented pattern of criminal behavior that financial institutions, FIUs, and regulators use to recognize and investigate financial crime. goAML Typology Codes are the standardized, machine-readable implementation of this concept within the FIU reporting ecosystem.

Suspicious Activity Reports (SARs) in the US context and STRs in most other jurisdictions both carry typology information, though the mechanisms differ. FinCEN's SAR form uses a checkbox structure to classify activity types, whereas goAML's typology codes are a formal taxonomy within a structured XML schema. The underlying purpose is the same: categorizing the suspected offense to support analysis at scale.

Behavioral analytics and network analysis are increasingly used to detect typology patterns before an alert even reaches an analyst. Machine learning models trained on historical STR data, labeled by typology, can flag incoming transactions that match known code patterns. This creates a feedback loop: quality typology coding of past reports improves the model's ability to detect the same patterns in the future.

Case management systems that integrate with goAML submissions should carry typology codes through the full case lifecycle. When a case is opened, investigated, escalated to an STR, and filed, the typology code should be consistent at every stage. Fragmented systems where analysts re-enter codes at filing time introduce inconsistency and increase miscoding risk across the institution.


Where does the term come from?

The goAML platform was developed by UNODC and first deployed around 2006 as a standardized tool to help developing-country FIUs build financial intelligence capacity. The typology code taxonomy within it draws directly from FATF's typology research program, which began formally with FATF's first typologies report in 1990. FATF Recommendation 29 in the current 2012 framework requires countries to establish FIUs capable of analyzing and disseminating financial intelligence. goAML's typology codes are the operational mechanism through which FIUs fulfill that analysis requirement at scale.


How FluxForce handles goaml typology codes

FluxForce AI agents monitor goaml typology codes-related patterns in real time, flag anomalies for analyst review, and generate evidence-backed decisions with full audit trails.

← Back to Glossary