Analysing USB traffic protocol decoder from a pcap Wireshark
Using "Apply as Filter" for relevant data, for example also looking for values like usb.data_flag == 'present'
The important is the "Leftover Capture Data". To add more columns, find the relevant field in the packet details, right click and select "Apply Column".
Go to File -> Export Packet Dissections -> As Plain Text and saving it somewhere with the name dump.txt.
node decode_usb_protocol.js
Protocol https://docs.mbed.com/docs/ble-hid/en/latest/api/md_doc_HID.html Key codes https://www.win.tue.nl/~aeb/linux/kbd/scancodes-14.html