Detailed build-up play analysis with passing network graphs - Defensive vulnerability mapping (spatial, temporal, personnel) - Counter-attack and transition profiling - Set-piece cataloging and classification