I'll answer the second question first, because it's easier. First you can always check the source field when searching against the target index. For file and directory monitors it will tell you which files provided the event.
As to the second, Splunk does not understand binary data. If you have a process that can translate the binary to something human readable, you can use that as a scripted input into splunk however.