Started from: https://github.com/hnesk/flipper-raw-rfid
Note, Had to trim the file, was to big for pm3
head -n31000 sig-Red354b.ask.div8 > sig-Red354b.ask.div8.trim
from flipper_raw_rfid.rifl import Rifl | |
from flipper_raw_rfid.utils import batched, pad_to_signal, signal_to_pad, autocorrelate, smooth, binarize, find_first_transition_index, find_peaks, histogram, smooth, binarize | |
from flipper_raw_rfid.bits import decode_lengths, decode_manchester, decode_em_4100, to_str | |
from matplotlib import pyplot as plt | |
from scipy import signal as scipy_signal | |
import numpy as np | |
import numpy | |
import sys | |
rifl = Rifl.load('Red354b.ask.raw') | |
pad = rifl.pulse_and_durations | |
# Convert it into something more usable (vector of 0 and 1) | |
signal = pad_to_signal(pad) | |
with open("sig-Red354b.ask.div8", "w") as txt_file: | |
for line in signal[::8]: | |
txt_file.write(str(line) + "\n") |
Started from: https://github.com/hnesk/flipper-raw-rfid
Note, Had to trim the file, was to big for pm3
head -n31000 sig-Red354b.ask.div8 > sig-Red354b.ask.div8.trim
usb] pm3 --> data load -f sig-Red354b.ask.div8.trim | |
[+] loaded 31000 samples | |
[usb] pm3 --> data convertbitstream | |
[usb] pm3 --> data rawdemod --ar | |
[+] ASK/Raw - clock 32 - decoded bitstream | |
[=] ---------------------------------------- | |
[+] DemodBuffer: | |
[+] 00110101010011001100101011001010 | |
[+] 10101010101011001100110100101101 | |
[+] 01010101010101010101001101001100 | |
[+] 10101011010011010010101011001011 | |
[+] 00110101010011001100101011001010 | |
[+] 10101010101011001100110100101101 | |
[+] 01010101010101010101001101001100 | |
[+] 10101011010011010010101011001011 | |
[+] 00110101010011001100101011001010 | |
[+] 10101010101011001100110100101101 | |
[+] 01010101010101010101001101001100 | |
[+] 10101011010011010010101011001011 | |
[+] 00110101010011001100101011001010 | |
[+] 10101010101011001100110100101101 | |
[+] 01010101010101010101001101001100 | |
[+] 10101011010011010010101011001011 | |
[usb] pm3 --> data print --hex | |
[+] DemodBuffer: | |
[+] 354CCACAAAACCD2D5555534CAB4D2ACB354CCACAAAACCD2D5555534CAB4D2ACB354CCACAAAACCD2D5555534CAB4D2ACB354CCACAAAACCD2D5555534CAB4D2ACB | |
[usb] pm3 --> lf em 410x demod | |
[+] EM 410x ID 56009F4EA2 | |
[+] EM410x ( RF/64 ) | |
[=] -------- Possible de-scramble patterns --------- | |
[+] Unique TAG ID : 6A00F97245 | |
[=] HoneyWell IdentKey | |
[+] DEZ 8 : 10440354 | |
[+] DEZ 10 : 0010440354 | |
[+] DEZ 5.5 : 00159.20130 | |
[+] DEZ 3.5A : 086.20130 | |
[+] DEZ 3.5B : 000.20130 | |
[+] DEZ 3.5C : 159.20130 | |
[+] DEZ 14/IK2 : 00369377627810 | |
[+] DEZ 15/IK3 : 000455282881093 | |
[+] DEZ 20/ZK : 06100000150907020405 | |
[=] | |
[+] Other : 20130_159_10440354 | |
[+] Pattern Paxton : 1454607522 [0x56B38CA2] | |
[+] Pattern 1 : 7309541 [0x6F88E5] | |
[+] Pattern Sebury : 20130 31 2051746 [0x4EA2 0x1F 0x1F4EA2] | |
[+] VD / ID : 086 / 0010440354 | |
[=] ------------------------------------------------ | |
[usb] pm3 --> data print --hex | |
[+] DemodBuffer: | |
[+] FFA98004BC9ED0AEFFA98004BC9ED0AE | |
[usb] pm3 --> lf simask --clk 64 --am -d FFA98004BC9ED0AEFFA98004BC9ED0AE | |
[=] Press <Enter> or pm3-button to abort simulation | |
[#] ASK simulating with rf/64, invert 0, encoding ASK/MAN (1), separator 0, n 8704 | |
NOTE: last nibble (0x0B) missing on purpose. Doesn't work otherwise | |
[usb] pm3 --> lf simask --clk 64 --ar -d 354CCACAAAACCD2D5555534CAB4D2ACB354CCACAAAACCD2D5555534CAB4D2AC | |
[=] Press <Enter> or pm3-button to abort simulation | |
[#] ASK simulating with rf/32, invert 0, encoding RAW/MAN (0), separator 0, n 16384 | |
[usb] pm3 --> lf em 410x sim --clk 64 --id 56009F4EA2 | |
[+] Starting simulating EM Tag ID 56009F4EA2 clock: 64 | |
[=] ............ | |
[=] Press <Enter> or pm3-button to abort simulation |