- examples/inputs/pcap-samples/README.md
- examples/inputs/pcap-samples/sample_network.pcap
# PCAP Network Capture Analysis Example
# This demonstrates parsing network packet capture (PCAP) files
# The sample_network.pcap file contains a minimal valid PCAP structure with one packet
decode = []
tag = "pcap"
# PCAP file header pattern (magic bytes)
[[patterns]]
name = "PCAP Magic (LE)"
pattern = "D4:C3:B2:A1"
type = "bytes"
[[patterns]]
name = "PCAP Magic (BE)"
pattern = "A1:B2:C3:D4"
type = "bytes"
[[patterns]]
name = "PCAP-NG Magic"
pattern = "0A:0D:0D:0A"
type = "bytes"
# Network protocol patterns
[[patterns]]
name = "Ethernet Frame"
pattern = "08:00"
type = "bytes"
[[patterns]]
name = "IPv4 Packet"
pattern = "45:00"
type = "bytes"
# DNS traffic patterns
[[patterns]]
name = "DNS Query Port"
pattern = "00:35"
type = "bytes"
[[patterns]]
name = "DNS Response Port"
pattern = "00:35"
type = "bytes"
# Common suspicious patterns in network traffic
[[patterns]]
name = "Private IP Range 192.168"
pattern = "192\\.168\\."
type = "regex"
[[patterns]]
name = "Private IP Range 10."
pattern = "10\\."
type = "regex"
# HTTP patterns
[[patterns]]
name = "HTTP GET"
pattern = "GET "
type = "string"
[[patterns]]
name = "HTTP POST"
pattern = "POST "
type = "string"
[[patterns]]
name = "HTTP User-Agent"
pattern = "User-Agent:"
type = "string"
case-insensitive = true
# Potential malicious patterns
[[patterns]]
name = "Suspicious User-Agent"
pattern = "curl|wget|python|powershell"
type = "regex"
case-insensitive = true
[[patterns]]
name = "Port Scan Pattern"
pattern = "SYN|RST|FIN"
type = "string"
| total_files | 2 |
| critical_count | 0 |
| high_count | 0 |
| medium_count | 0 |
| low_count | 0 |
| minimal_count | 2 |
| must_investigate_count | 0 |
| all_scores | None |
| generated_at | 2026-02-01T11:39:25.366428348+00:00 |
| characteristics_score | file_type | file_type_score | must_investigate | path | pattern_count_score | pattern_matches | pattern_severity_score | reasons | risk_level | score | sha256 |
| 0 | Other | 0 | False | /sample_network.pcap | 5 | 4 | 6 | ["4 suspicious patterns detected"] | Minimal | 11 | 572bfa306b2a8ff2938aa7fb045ba7247b4b3ebad076aa944c63bd5b85e95c90 |
| 0 | Other | 0 | False | /README.md | 0 | 0 | 0 | [] | Minimal | 0 | a3e97de119a856c104957ef70de33278488b86d5c682f8d35dbb0f47c053f485 |
Empty CSV
| path | file_name | sha256 | file_created | file_modified | file_accessed | mime_types_from_file_extension | is_symbolic_link | is_extracted_file | is_decoded_file | is_deobfuscated_file | tag |
| /sample_network.pcap | sample_network.pcap | 572bfa306b2a8ff2938aa7fb045ba7247b4b3ebad076aa944c63bd5b85e95c90 | 2026-02-01T11:24:46.719969497Z | 2026-02-01T11:24:46.719969497Z | 2026-02-01T11:25:18.689983469Z | ["application/vnd.tcpdump.pcap"] | 0 | 0 | 0 | 0 | |
| /README.md | README.md | a3e97de119a856c104957ef70de33278488b86d5c682f8d35dbb0f47c053f485 | 2026-02-01T11:24:46.719969497Z | 2026-02-01T11:24:46.719969497Z | 2026-02-01T11:25:18.689983469Z | ["application/x-genesis-rom"] | 0 | 0 | 0 | 0 | |
| id | sha256 | pattern_name | match_type | match | location | length |
| 1 | 572bfa306b2a8ff2938aa7fb045ba7247b4b3ebad076aa944c63bd5b85e95c90 | PCAP Magic (LE) | bytes | �ò� | 0 | 4 |
| 2 | 572bfa306b2a8ff2938aa7fb045ba7247b4b3ebad076aa944c63bd5b85e95c90 | Ethernet Frame | bytes | | 52 | 2 |
| 3 | 572bfa306b2a8ff2938aa7fb045ba7247b4b3ebad076aa944c63bd5b85e95c90 | IPv4 Packet | bytes | E | 54 | 2 |
| 4 | 572bfa306b2a8ff2938aa7fb045ba7247b4b3ebad076aa944c63bd5b85e95c90 | DNS Query Port | bytes | | 76 | 2 |
Empty CSV
| sha256 | sha1 | md5 | file_size | mime_type_for_content | shannon_entropy |
| 572bfa306b2a8ff2938aa7fb045ba7247b4b3ebad076aa944c63bd5b85e95c90 | f4cce328565be999ba6285127fb5cab6b105e87e | 0142c4bceadf5a8e3a21bac956842443 | 90 | application/vnd.tcpdump.pcap | 3.07257160262939 |
| a3e97de119a856c104957ef70de33278488b86d5c682f8d35dbb0f47c053f485 | 7003b899cedb7e97ecdb284e8d450cd9fb5af151 | eb8b335532bc6cc6615224654cdd5682 | 1053 | text/plain | 4.73902362133387 |