Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SmartMX with MIFARE 1K emulation #364

Closed
Xoib opened this issue Sep 12, 2016 · 4 comments
Closed

SmartMX with MIFARE 1K emulation #364

Xoib opened this issue Sep 12, 2016 · 4 comments

Comments

@Xoib
Copy link

Xoib commented Sep 12, 2016

Hello,

With a SCL3711 (PN533), I am trying to deal with a SmartMX with MIFARE 1K emulation.
Of course I obtain an error when using mifare tools because it doesn't recognize how to deal with the mifare part.
Is there anyone that found a solution already?

./utils/nfc-list -v
NFC device: SCM Micro / SCL3711-NFC&RW opened
1 ISO14443A passive target(s) found:
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04
* UID size: single
* bit frame anticollision supported
       UID (NFCID1): 65  93  7f  d1
      SAK (SEL_RES): 00
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:
[b]* SmartMX with MIFARE 1K emulation[/b]
Other possible matches based on ATQA & SAK values:

0 Felica (212 kbps) passive target(s) found.

0 Felica (424 kbps) passive target(s) found.

0 ISO14443B passive target(s) found.

0 ISO14443B' passive target(s) found.

0 ISO14443B-2 ST SRx passive target(s) found.

0 ISO14443B-2 ASK CTx passive target(s) found.

0 Jewel passive target(s) found.
./utils/nfc-mfclassic r a u mycard.mfd
NFC reader: SCM Micro / SCL3711-NFC&RW opened
Warning: tag is probably not a MFC!
Found MIFARE Classic card:
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04
       UID (NFCID1): 65  93  7f  d1
      SAK (SEL_RES): 00
Error: tag disappeared
./mfoc -O mycard.dmp
mfoc: ERROR: only Mifare Classic is supported

Thanks,

@DocSniper
Copy link

Since the last version I have problems with my PN533 too. I can't read tags successfully.

$ mfoc -O mfc1k.mfd
error libnfc.chip.pn53x Unexpected PN53x reply!
ISO/IEC 14443A (106 kbps) target:
[...]
Fingerprinting based on MIFARE type Identification Procedure:

  • MIFARE Classic 1K
  • MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
  • SmartMX with MIFARE 1K emulation
    Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '' B key found, 'x' both keys found
[Key: ffffffffffff] -> [xnfc_initiator_mifare_cmd: Timeout

@doegox
Copy link
Member

doegox commented Feb 17, 2017

I tried nfc-mcflassic on a JCOP J3A081 + MFC 1k and nfc-mfclassic worked as expected.
Are you sure your card has MFC or is it just based on nfc-list output?

@Xoib
Copy link
Author

Xoib commented Feb 17, 2017

I forgot this opened issue, this has been resolved, it's a proprietary protocol over ISO14443A, not Mifare related.

@Xoib Xoib closed this as completed Feb 17, 2017
@TonyPeng-cyber
Copy link

Hi, I meet the same problem when trying to write/read block for Mifare Emulator in Mifare Smart MX based card. Can you help share more experience on how you solve the problem?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants