From a few of sample sessions, I've grouped the ser2net packets on what I believe is the command byte at offset 6 (byte #7) and then noted changed nibbles with a dot.
Each packets begins with a header (two bytes magic [0x55, 0xbb], length, unknown, two bytes sequence number, command byte)...