Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2018-06-16 23:08:32

atyppo
Contributor
Registered: 2017-03-12
Posts: 36

HID 36-bit Format

Just received a 36-bit tag. I've never seen one of these before. Commands I tried are listed below.

austin@austin-VirtualBox:~$ cd proxmark3/client
austin@austin-VirtualBox:~/proxmark3/client$ ./proxmark3 /dev/ttyACM0
Prox/RFID mark3 RFID instrument          
bootrom: master/v3.0.1-75-g1dae981-suspect 2017-08-27 16:49:17
os: master/v2.3 2016-09-19 20:28:38
LF FPGA image built for 2s30vq100 on 2015/03/06 at 07:38:04
HF FPGA image built for 2s30vq100 on 2015/11/ 2 at  9: 8: 8
          
uC: AT91SAM7S512 Rev B          
Embedded Processor: ARM7TDMI          
Nonvolatile Program Memory Size: 512K bytes. Used: 183707 bytes (35%). Free: 340581 bytes (65%).          
Second Nonvolatile Program Memory Size: None          
Internal SRAM Size: 64K bytes          
Architecture Identifier: AT91SAM7Sxx Series          
Nonvolatile Program Memory Type: Embedded Flash Memory          
proxmark3> lf hid read
#db# DownloadFPGA(len: 42096)          
#db# TAG ID: 36cbc29fef (20471) - Format Len: 36bit - FC: 0 - Card: 0          


proxmark3> data printdemod x
DemodBuffer: 1D555A69A59AA55996AAA9AA         

proxmark3> lf t55xx dump
Reading Page 0:          
blk | hex data | binary          
----+----------+---------------------------------          
#db# DownloadFPGA(len: 42096)          
Reading Page 1:          
blk | hex data | binary          
----+----------+---------------------------------

I also tried this.

proxmark3> data printdemod x o 1
DemodBuffer: 3AAAB4D34B354AB32D55535          
proxmark3> data printdemod x o 2
DemodBuffer: 755569A6966A95665AAAA6A800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000          
proxmark3> data printdemod x o 3
DemodBuffer: EAAAD34D2CD52ACCB5554D5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000          
proxmark3> data printdemod x o 3
DemodBuffer: EAAAD34D2CD52ACCB5554D5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000          
proxmark3> data printdemod x o 4
DemodBuffer: D555A69A59AA55996AAA9AA000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000          
proxmark3> data printdemod x o 5
DemodBuffer: AAAB4D34B354AB32D555354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000          
proxmark3> data printdemod x o 6
DemodBuffer: 55569A6966A95665AAAA6A8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000

Any suggestions on cloning this or further commands to try? Thanks!

Offline

#2 2018-08-28 18:42:05

grauerfuchs
Contributor
Registered: 2018-08-28
Posts: 50

Re: HID 36-bit Format

This looks like it might be an HID Siemens tag.

As output from my updated HID decoder (from my fork; pending inclusion in official repo)

proxmark3> lf hid decode 36cbc29fef
Sie36            FC: 222689, Card: 20471, IL: 0, Parity valid 

Is there any number printed on this card?

Offline

Board footer

Powered by FluxBB