xref: /freebsd/contrib/file/magic/Magdir/sniffer (revision 5ca8e32633c4ffbbcd6762e5888b6a4ba0708c6c)
1
2#------------------------------------------------------------------------------
3# $File: sniffer,v 1.34 2022/12/14 18:27:36 christos Exp $
4# sniffer:  file(1) magic for packet capture files
5#
6# From: guy@alum.mit.edu (Guy Harris)
7#
8
9#
10# Microsoft Network Monitor 1.x capture files.
11#
120	string		RTSS		NetMon capture file
13>5	byte		x		- version %d
14>4	byte		x		\b.%d
15>6	leshort		0		(Unknown)
16>6	leshort		1		(Ethernet)
17>6	leshort		2		(Token Ring)
18>6	leshort		3		(FDDI)
19>6	leshort		4		(ATM)
20>6	leshort		>4		(type %d)
21
22#
23# Microsoft Network Monitor 2.x capture files.
24#
250	string		GMBU		NetMon capture file
26>5	byte		x		- version %d
27>4	byte		x		\b.%d
28>6	leshort		0		(Unknown)
29>6	leshort		1		(Ethernet)
30>6	leshort		2		(Token Ring)
31>6	leshort		3		(FDDI)
32>6	leshort		4		(ATM)
33>6	leshort		5		(IP-over-IEEE 1394)
34>6	leshort		6		(802.11)
35>6	leshort		7		(Raw IP)
36>6	leshort		8		(Raw IP)
37>6	leshort		9		(Raw IP)
38>6	leshort		>9		(type %d)
39
40#
41# Network General Sniffer capture files.
42# Sorry, make that "Network Associates Sniffer capture files."
43# Sorry, make that "Network General old DOS Sniffer capture files."
44#
450	string		TRSNIFF\040data\040\040\040\040\032	Sniffer capture file
46>33	byte		2		(compressed)
47>23	leshort		x		- version %d
48>25	leshort		x		\b.%d
49>32	byte		0		(Token Ring)
50>32	byte		1		(Ethernet)
51>32	byte		2		(ARCNET)
52>32	byte		3		(StarLAN)
53>32	byte		4		(PC Network broadband)
54>32	byte		5		(LocalTalk)
55>32	byte		6		(Znet)
56>32	byte		7		(Internetwork Analyzer)
57>32	byte		9		(FDDI)
58>32	byte		10		(ATM)
59
60#
61# Cinco Networks NetXRay capture files.
62# Sorry, make that "Network General Sniffer Basic capture files."
63# Sorry, make that "Network Associates Sniffer Basic capture files."
64# Sorry, make that "Network Associates Sniffer Basic, and Windows
65# Sniffer Pro", capture files."
66# Sorry, make that "Network General Sniffer capture files."
67# Sorry, make that "NetScout Sniffer capture files."
68#
690	string		XCP\0		NetXRay capture file
70>4	string		>\0		- version %s
71>44	leshort		0		(Ethernet)
72>44	leshort		1		(Token Ring)
73>44	leshort		2		(FDDI)
74>44	leshort		3		(WAN)
75>44	leshort		8		(ATM)
76>44	leshort		9		(802.11)
77
78#
79# "libpcap" capture files.
80# https://www.tcpdump.org/manpages/pcap-savefile.5.html
81# (We call them "tcpdump capture file(s)" for now, as "tcpdump" is
82# the main program that uses that format, but there are other programs
83# that use "libpcap", or that use the same capture file format.)
84#
850	name		pcap-be
86>4	beshort		x		- version %d
87>6	beshort		x		\b.%d
88# clear that continuation level match
89>20	clear		x
90>20	belong&0x03FFFFFF		0		(No link-layer encapsulation
91>20	belong&0x03FFFFFF		1		(Ethernet
92>20	belong&0x03FFFFFF		2		(3Mb Ethernet
93>20	belong&0x03FFFFFF		3		(AX.25
94>20	belong&0x03FFFFFF		4		(ProNET
95>20	belong&0x03FFFFFF		5		(CHAOS
96>20	belong&0x03FFFFFF		6		(Token Ring
97>20	belong&0x03FFFFFF		7		(BSD ARCNET
98>20	belong&0x03FFFFFF		8		(SLIP
99>20	belong&0x03FFFFFF		9		(PPP
100>20	belong&0x03FFFFFF		10		(FDDI
101>20	belong&0x03FFFFFF		11		(RFC 1483 ATM
102>20	belong&0x03FFFFFF		12		(Raw IP
103>20	belong&0x03FFFFFF		13		(BSD/OS SLIP
104>20	belong&0x03FFFFFF		14		(BSD/OS PPP
105>20	belong&0x03FFFFFF		19		(Linux ATM Classical IP
106>20	belong&0x03FFFFFF		50		(PPP or Cisco HDLC
107>20	belong&0x03FFFFFF		51		(PPP-over-Ethernet
108>20	belong&0x03FFFFFF		99		(Symantec Enterprise Firewall
109>20	belong&0x03FFFFFF		100		(RFC 1483 ATM
110>20	belong&0x03FFFFFF		101		(Raw IP
111>20	belong&0x03FFFFFF		102		(BSD/OS SLIP
112>20	belong&0x03FFFFFF		103		(BSD/OS PPP
113>20	belong&0x03FFFFFF		104		(BSD/OS Cisco HDLC
114>20	belong&0x03FFFFFF		105		(802.11
115>20	belong&0x03FFFFFF		106		(Linux Classical IP over ATM
116>20	belong&0x03FFFFFF		107		(Frame Relay
117>20	belong&0x03FFFFFF		108		(OpenBSD loopback
118>20	belong&0x03FFFFFF		109		(OpenBSD IPsec encrypted
119>20	belong&0x03FFFFFF		112		(Cisco HDLC
120>20	belong&0x03FFFFFF		113		(Linux cooked v1
121>20	belong&0x03FFFFFF		114		(LocalTalk
122>20	belong&0x03FFFFFF		117		(OpenBSD PFLOG
123>20	belong&0x03FFFFFF		119		(802.11 with Prism header
124>20	belong&0x03FFFFFF		122		(RFC 2625 IP over Fibre Channel
125>20	belong&0x03FFFFFF		123		(SunATM
126>20	belong&0x03FFFFFF		127		(802.11 with radiotap header
127>20	belong&0x03FFFFFF		129		(Linux ARCNET
128>20	belong&0x03FFFFFF		130		(Juniper Multi-Link PPP
129>20	belong&0x03FFFFFF		131		(Juniper Multi-Link Frame Relay
130>20	belong&0x03FFFFFF		132		(Juniper Encryption Services PIC
131>20	belong&0x03FFFFFF		133		(Juniper GGSN PIC
132>20	belong&0x03FFFFFF		134		(Juniper FRF.16 Frame Relay
133>20	belong&0x03FFFFFF		135		(Juniper ATM2 PIC
134>20	belong&0x03FFFFFF		136		(Juniper Advanced Services PIC
135>20	belong&0x03FFFFFF		137		(Juniper ATM1 PIC
136>20	belong&0x03FFFFFF		138		(Apple IP over IEEE 1394
137>20	belong&0x03FFFFFF		139		(SS7 MTP2 with pseudo-header
138>20	belong&0x03FFFFFF		140		(SS7 MTP2
139>20	belong&0x03FFFFFF		141		(SS7 MTP3
140>20	belong&0x03FFFFFF		142		(SS7 SCCP
141>20	belong&0x03FFFFFF		143		(DOCSIS
142>20	belong&0x03FFFFFF		144		(Linux IrDA
143>20	belong&0x03FFFFFF		147		(Private use 0
144>20	belong&0x03FFFFFF		148		(Private use 1
145>20	belong&0x03FFFFFF		149		(Private use 2
146>20	belong&0x03FFFFFF		150		(Private use 3
147>20	belong&0x03FFFFFF		151		(Private use 4
148>20	belong&0x03FFFFFF		152		(Private use 5
149>20	belong&0x03FFFFFF		153		(Private use 6
150>20	belong&0x03FFFFFF		154		(Private use 7
151>20	belong&0x03FFFFFF		155		(Private use 8
152>20	belong&0x03FFFFFF		156		(Private use 9
153>20	belong&0x03FFFFFF		157		(Private use 10
154>20	belong&0x03FFFFFF		158		(Private use 11
155>20	belong&0x03FFFFFF		159		(Private use 12
156>20	belong&0x03FFFFFF		160		(Private use 13
157>20	belong&0x03FFFFFF		161		(Private use 14
158>20	belong&0x03FFFFFF		162		(Private use 15
159>20	belong&0x03FFFFFF		163		(802.11 with AVS header
160>20	belong&0x03FFFFFF		164		(Juniper Passive Monitor PIC
161>20	belong&0x03FFFFFF		165		(BACnet MS/TP
162>20	belong&0x03FFFFFF		166		(PPPD
163>20	belong&0x03FFFFFF		167		(Juniper PPPoE
164>20	belong&0x03FFFFFF		168		(Juniper PPPoE/ATM
165>20	belong&0x03FFFFFF		169		(GPRS LLC
166>20	belong&0x03FFFFFF		170		(GPF-T
167>20	belong&0x03FFFFFF		171		(GPF-F
168>20	belong&0x03FFFFFF		174		(Juniper PIC Peer
169>20	belong&0x03FFFFFF		175		(Ethernet with Endace ERF header
170>20	belong&0x03FFFFFF		176		(Packet-over-SONET with Endace ERF header
171>20	belong&0x03FFFFFF		177		(Linux LAPD
172>20	belong&0x03FFFFFF		178		(Juniper Ethernet
173>20	belong&0x03FFFFFF		179		(Juniper PPP
174>20	belong&0x03FFFFFF		180		(Juniper Frame Relay
175>20	belong&0x03FFFFFF		181		(Juniper C-HDLC
176>20	belong&0x03FFFFFF		182		(FRF.16 Frame Relay
177>20	belong&0x03FFFFFF		183		(Juniper Voice PIC
178>20	belong&0x03FFFFFF		184		(Arinc 429
179>20	belong&0x03FFFFFF		185		(Arinc 653 Interpartition Communication
180>20	belong&0x03FFFFFF		186		(USB with FreeBSD header
181>20	belong&0x03FFFFFF		187		(Bluetooth HCI H4
182>20	belong&0x03FFFFFF		188		(802.16 MAC Common Part Sublayer
183>20	belong&0x03FFFFFF		189		(Linux USB
184>20	belong&0x03FFFFFF		190		(Controller Area Network (CAN) v. 2.0B
185>20	belong&0x03FFFFFF		191		(802.15.4 with Linux padding
186>20	belong&0x03FFFFFF		192		(PPI
187>20	belong&0x03FFFFFF		193		(802.16 MAC Common Part Sublayer plus radiotap header
188>20	belong&0x03FFFFFF		194		(Juniper Integrated Service Module
189>20	belong&0x03FFFFFF		195		(802.15.4 with FCS
190>20	belong&0x03FFFFFF		196		(SITA
191>20	belong&0x03FFFFFF		197		(Endace ERF
192>20	belong&0x03FFFFFF		198		(Ethernet with u10 Networks pseudo-header
193>20	belong&0x03FFFFFF		199		(IPMB
194>20	belong&0x03FFFFFF		200		(Juniper Secure Tunnel
195>20	belong&0x03FFFFFF		201		(Bluetooth HCI H4 with pseudo-header
196>20	belong&0x03FFFFFF		202		(AX.25 with KISS header
197>20	belong&0x03FFFFFF		203		(LAPD
198>20	belong&0x03FFFFFF		204		(PPP with direction pseudo-header
199>20	belong&0x03FFFFFF		205		(Cisco HDLC with direction pseudo-header
200>20	belong&0x03FFFFFF		206		(Frame Relay with direction pseudo-header
201>20	belong&0x03FFFFFF		209		(Linux IPMB
202>20	belong&0x03FFFFFF		215		(802.15.4 with non-ASK PHY header
203>20	belong&0x03FFFFFF		216		(Linux evdev events
204>20	belong&0x03FFFFFF		219		(MPLS with label as link-layer header
205>20	belong&0x03FFFFFF		220		(Memory-mapped Linux USB
206>20	belong&0x03FFFFFF		221		(DECT
207>20	belong&0x03FFFFFF		222		(AOS Space Data Link protocol
208>20	belong&0x03FFFFFF		223		(Wireless HART
209>20	belong&0x03FFFFFF		224		(Fibre Channel FC-2
210>20	belong&0x03FFFFFF		225		(Fibre Channel FC-2 with frame delimiters
211>20	belong&0x03FFFFFF		226		(Solaris IPNET
212>20	belong&0x03FFFFFF		227		(SocketCAN
213>20	belong&0x03FFFFFF		228		(Raw IPv4
214>20	belong&0x03FFFFFF		229		(Raw IPv6
215>20	belong&0x03FFFFFF		230		(802.15.4 without FCS
216>20	belong&0x03FFFFFF		231		(D-Bus messages
217>20	belong&0x03FFFFFF		232		(Juniper Virtual Server
218>20	belong&0x03FFFFFF		233		(Juniper SRX E2E
219>20	belong&0x03FFFFFF		234		(Juniper Fibre Channel
220>20	belong&0x03FFFFFF		235		(DVB-CI
221>20	belong&0x03FFFFFF		236		(MUX27010
222>20	belong&0x03FFFFFF		237		(STANAG 5066 D_PDUs
223>20	belong&0x03FFFFFF		238		(Juniper ATM CEMIC
224>20	belong&0x03FFFFFF		239		(Linux netfilter log messages
225>20	belong&0x03FFFFFF		240		(Hilscher netAnalyzer
226>20	belong&0x03FFFFFF		241		(Hilscher netAnalyzer with delimiters
227>20	belong&0x03FFFFFF		242		(IP-over-Infiniband
228>20	belong&0x03FFFFFF		243		(MPEG-2 Transport Stream packets
229>20	belong&0x03FFFFFF		244		(ng4t ng40
230>20	belong&0x03FFFFFF		245		(NFC LLCP
231>20	belong&0x03FFFFFF		246		(Packet filter state syncing
232>20	belong&0x03FFFFFF		247		(InfiniBand
233>20	belong&0x03FFFFFF		248		(SCTP
234>20	belong&0x03FFFFFF		249		(USB with USBPcap header
235>20	belong&0x03FFFFFF		250		(Schweitzer Engineering Laboratories RTAC packets
236>20	belong&0x03FFFFFF		251		(Bluetooth Low Energy air interface
237>20	belong&0x03FFFFFF		252		(Wireshark Upper PDU export
238>20	belong&0x03FFFFFF		253		(Linux netlink
239>20	belong&0x03FFFFFF		254		(Bluetooth Linux Monitor
240>20	belong&0x03FFFFFF		255		(Bluetooth Basic Rate/Enhanced Data Rate baseband packets
241>20	belong&0x03FFFFFF		256		(Bluetooth Low Energy air interface with pseudo-header
242>20	belong&0x03FFFFFF		257		(PROFIBUS data link layer
243>20	belong&0x03FFFFFF		258		(Apple DLT_PKTAP
244>20	belong&0x03FFFFFF		259		(Ethernet with 802.3 Clause 65 EPON preamble
245>20	belong&0x03FFFFFF		260		(IPMI trace packets
246>20	belong&0x03FFFFFF		261		(Z-Wave RF profile R1 and R2 packets
247>20	belong&0x03FFFFFF		262		(Z-Wave RF profile R3 packets
248>20	belong&0x03FFFFFF		263		(WattStopper Digital Lighting Mngmt/Legrand Nitoo Open Proto
249>20	belong&0x03FFFFFF		264		(ISO 14443 messages
250>20	belong&0x03FFFFFF		265		(IEC 62106 Radio Data System groups
251>20	belong&0x03FFFFFF		266		(USB with Darwin header
252>20	belong&0x03FFFFFF		267		(OpenBSD DLT_OPENFLOW
253>20	belong&0x03FFFFFF		268		(IBM SDLC frames
254>20	belong&0x03FFFFFF		269		(TI LLN sniffer frames
255>20	belong&0x03FFFFFF		271		(Linux vsock
256>20	belong&0x03FFFFFF		272		(Nordic Semiconductor Bluetooth LE sniffer frames
257>20	belong&0x03FFFFFF		273		(Excentis XRA-31 DOCSIS 3.1 RF sniffer frames
258>20	belong&0x03FFFFFF		274		(802.3br mPackets
259>20	belong&0x03FFFFFF		275		(DisplayPort AUX channel monitoring data
260>20	belong&0x03FFFFFF		276		(Linux cooked v2
261>20	belong&0x03FFFFFF		278		(OpenVizsla USB
262>20	belong&0x03FFFFFF		279		(Elektrobit High Speed Capture and Replay (EBHSCR)
263>20	belong&0x03FFFFFF		281		(Broadcom tag
264>20	belong&0x03FFFFFF		282		(Broadcom tag (prepended)
265>20	belong&0x03FFFFFF		283		(802.15.4 with TAP
266>20	belong&0x03FFFFFF		284		(Marvell DSA
267>20	belong&0x03FFFFFF		285		(Marvell EDSA
268>20	belong&0x03FFFFFF		286		(ELEE lawful intercept
269>20	belong&0x03FFFFFF		287		(Z-Wave serial
270>20	belong&0x03FFFFFF		288		(USB 2.0
271>20	belong&0x03FFFFFF		289		(ATSC ALP
272>20	belong&0x03FFFFFF		290		(Event Tracing for Windows
273>20	belong&0x03FFFFFF		291		(Hilscher netANALYZER NG pseudo-footer
274>20	belong&0x03FFFFFF		292		(ZBOSS NCP protocol with pseudo-header
275>20	belong&0x03FFFFFF		293		(Low-Speed USB 2.0/1.1/1.0
276>20	belong&0x03FFFFFF		294		(Full-Speed USB 2.0/1.1/1.0
277>20	belong&0x03FFFFFF		295		(High-Speed USB 2.0
278# print default match
279>20	default		x
280>>20	belong		x		(linktype#%u
281>16	belong		x		\b, capture length %u)
282
283# packets time stamps in seconds and microseconds.
2840	ubelong		0xa1b2c3d4	pcap capture file, microseconds ts (big-endian)
285!:mime	application/vnd.tcpdump.pcap
286>0	use	pcap-be
2870	ulelong		0xa1b2c3d4	pcap capture file, microsecond ts (little-endian)
288!:mime	application/vnd.tcpdump.pcap
289>0	use	\^pcap-be
290
291# packets time stamps in seconds and nanoseconds.
2920	ubelong		0xa1b23c4d	pcap capture file, nanosecond ts (big-endian)
293!:mime	application/vnd.tcpdump.pcap
294>0	use	pcap-be
2950	ulelong		0xa1b23c4d	pcap capture file, nanosecond ts (little-endian)
296!:mime	application/vnd.tcpdump.pcap
297>0	use	\^pcap-be
298
299#
300# "libpcap"-with-Alexey-Kuznetsov's-patches capture files.
301#
3020	ubelong		0xa1b2cd34	pcap capture file, microsecond ts, extensions (big-endian)
303>0	use	pcap-be
3040	ulelong		0xa1b2cd34	pcap capture file, microsecond ts, extensions (little-endian)
305>0	use	\^pcap-be
306
307#
308# "pcapng" capture files.
309# https://github.com/pcapng/pcapng
310# Pcapng files can contain multiple sections. Printing the endianness,
311# snaplen, or other information from the first SHB may be misleading.
312#
3130	ubelong		0x0a0d0d0a
314>8	ubelong		0x1a2b3c4d	pcapng capture file
315>>12	beshort		x		- version %d
316>>14	beshort		x		\b.%d
3170	ulelong		0x0a0d0d0a
318>8	ulelong		0x1a2b3c4d	pcapng capture file
319>>12	leshort		x		- version %d
320>>14	leshort		x		\b.%d
321
322#
323# AIX "iptrace" capture files.
324#
3250	string		iptrace\0401.0	AIX iptrace capture file
3260	string		iptrace\0402.0	AIX iptrace capture file
327
328#
329# Novell LANalyzer capture files.
330# URL:		http://www.blacksheepnetworks.com/security/info/nw/lan/trace.txt
331# Reference:	https://github.com/wireshark/wireshark/blob/master/wiretap/lanalyzer.c
332# Update:	Joerg Jenderek
333#
334# regular trace header record (RT_HeaderRegular)
3350	leshort		0x1001
336# GRR: line above is too generic because it matches Commodore Plus/4 BASIC V3.5
337# and VIC-20 BASIC V2 program
338# skip many Commodore Basic program (Microzodiac.prg Minefield.prg Vic-tac-toe.prg breakvic_joy.prg)
339# with invalid second record type 0 instead of "Trace receive channel name record"
340>(2.s+4)	leshort	=0x1006h
341>>0	use	novell-lanalyzer
342# cyclic trace header record (RT_HeaderCyclic)
3430	leshort		0x1007
344>0	use	novell-lanalyzer
3450	name	novell-lanalyzer
346>0	leshort		x		Novell LANalyzer capture file
347# https://reposcope.com/mimetype/application/x-lanalyzer
348!:mime	application/x-lanalyzer
349# maybe also TR2 .. TR9 TRA .. TRZ
350!:ext	tr1
351# version like: 1.5
352>4		ubyte	x		\b, version %u
353# minor version; one byte identifying the trace file minor version number
354>5		ubyte	x		\b.%u
355# Trace header record type like: 1001~regular or 1007~cyclic
356>0	leshort		!0x1001		\b, record type %4.4x
357# record_length[2] is the length of the data part of 1st reorcd (without "type" and "length" fields) like: 4Ch
358>2		leshort	x		\b, record length %#x
359# second record type like: 1006h~Trace receive channel name record
360>(2.s+4)	leshort	!0x1006h	\b, 2nd record type %#4.4x
361>(2.s+6)	leshort	x		\b, 2nd record length %#x
362# each channel name is a null-terminated, eight-byte ASCII string like: Channel1
363>(2.s+8)	string	x		\b, names %.9s
364# 2nd channel name like: Channel2
365>(2.s+17)	string	x		%.9s ...
366
367#
368# HP-UX "nettl" capture files.
369# URL:		https://nixdoc.net/man-pages/HP-UX/man1m/nettl.1m.html
370# Reference:	https://github.com/wireshark/wireshark/blob/master/wiretap/nettl.c
371# Update:	Joerg Jenderek
372# Note:		Wireshark fills "meta information header fields" with "dummy" values
373# nettl_magic_hpux9[12]; for HP-UX 9.x not tested
3740	string		\x00\x00\x00\x01\x00\x00\x00\x00\x00\x07\xD0\x00	HP/UX 9.x nettl capture file
375!:mime	application/x-nettl
376!:ext	trc0/trc1
377# nettl_magic_hpux10[12]; for HP-UX 10.x and 11.x
3780	string		\x54\x52\x00\x64\x00	HP/UX nettl capture file
379# https://reposcope.com/mimetype/application/x-nettl
380!:mime	application/x-nettl
381# maybe also TRC000 TRC001 TRC002 ...
382!:ext	trc0/trc1
383# file_name[56]; maybe also like /tmp/raw.tr.TRC000
384>12	string		!/tmp/wireshark.TRC000
385>>12	string		x			"%-.56s"
386# tz[20]; like UTC
387>68	string		!UTC			\b, tz
388>>68	string		x			%-.20s
389# host_name[9];
390>88	string		>\0			\b, host %-.9s
391# os_vers[9]; like B.11.11
392>97	string		!B.11.11		\b, os
393>>97	string		x			%-.9s
394# os_v; like 55h
395>>106	ubyte		x			(%#x)
396# xxa[8]; like 0
397>107	ubequad		!0			\b, xxa=%#16.16llx
398# model[11] like: 9000/800
399>115	string		!9000/800		\b, model
400>>115	string		x			%-.11s
401# unknown; probably just padding to 128 bytes like: 0406h
402>126	ubeshort	!0x0406h		\b, at 126 %#4.4x
403
404#
405# RADCOM WAN/LAN Analyzer capture files.
406#
4070	string		\x42\xd2\x00\x34\x12\x66\x22\x88	RADCOM WAN/LAN Analyzer capture file
408
409#
410# NetStumbler log files.  Not really packets, per se, but about as
411# close as you can get.  These are log files from NetStumbler, a
412# Windows program, that scans for 802.11b networks.
413#
4140	string		NetS		NetStumbler log file
415>8	lelong		x		\b, %d stations found
416
417#
418# *Peek tagged capture files.
419#
4200	string		\177ver		EtherPeek/AiroPeek/OmniPeek capture file
421
422#
423# Visual Networks traffic capture files.
424#
4250	string		\x05VNF		Visual Networks traffic capture file
426
427#
428# Network Instruments Observer capture files.
429#
4300	string		ObserverPktBuffe	Network Instruments Observer capture file
431
432#
433# Files from Accellent Group's 5View products.
434#
435# URL:		http://www.infovista.com
436# Reference:	http://mark0.net/download/triddefs_xml.7z
437#		defs/0/5vw.trid.xml
438#		https://2.na.dl.wireshark.org/src/wireshark-3.6.2.tar.xz
439#		wireshark-3.6.2/wiretap/5views.c
440# Update:	Joerg Jenderek
441# Note:		called "5View capture" by TrID and
442#		"Wireshark capture file" on Windows or
443#		"Packet Capture (Accellent/InfoVista 5view)" by shared MIME-info database
444#		verified/falsified by `wireshark *.5vw`
4450	string		\xaa\xaa\xaa\xaa
446# skip misidentified boot/x86_64/loader/kroete.dat on Suse LEAP DVD
447# by check for valid record version
448>8	ulelong		=0x00010000
449>>0	use	5view-le
4500	name	5view-le
451# t_5VW_Info_Header.Signature = CST_5VW_INFO_HEADER_KEY = 0xAAAAAAAAU
452>0	ulelong		x			5View capture file
453# https://reposcope.com/mimetype/application/x-5view
454!:mime	application/x-5view
455!:ext	5vw
456# size of header in bytes (included signature and reserved fields); probably always 20h
457>4	ulelong		!0x00000020		\b, header size %#x
458# version of header record; apparently always CST_5VW_INFO_RECORD_VERSION=0x00010000U
459>8	ulelong		!0x00010000		\b, record version %#x
460# DataSize; total size of data without header like: 18h
461>12	ulelong		x			\b, record size %#x
462# filetype; type of the capture file like: 18001000h
463>16	ulelong		x			\b, file type %#8.8x
464# Reserved[3]; reserved for future use; apparently zero
465>20	quad		!0			\b, Reserved %#llx
466# look for record header key CST_5VW_RECORDS_HEADER_KEY of structure t_5VW_TimeStamped_Header
467>0x20	search/0xB8/b	\xEE\xEE\x33\x33	\b; record
468# HeaderSize; actual size of this header in bytes like: 32 24h
469>>&0	uleshort	x			size %#x
470# HeaderType; exact type of this header; probably always 0x4000
471>>&2	uleshort	!0x4000			\b, header type %#x
472# RecType; type of record like: 80000000h
473>>&4	ulelong		x			\b, record type %#x
474# RecSubType; subtype of record like: 0
475>>&8	ulelong		!0			\b, subtype %#x
476# RecSize; Size of one record like: 5Ch
477>>&12	ulelong		x			\b, RecSize %#x
478# RecNb; Number of records like: 1
479>>&16	ulelong		>1			\b, %#x records
480# Timestamp Utc
481#>>&20	ulelong		x			\b, RAW TIME %#8.8x
482>>&20	date		x			\b, Time-stamp %s
483