Strange card indeed. Don't think I've seen a raw read only have one block of data that repeates. (Or multiple blocks that are identical.) Is it to a hotel system?
thanks, figured it out with help of the sequence modifier
]]>AM / STT / 32, get the repeating hex.
data print x
2488078D334332023092201E13124403C35
2488078D346470F02092201E13124403C35
2488078D3497680F2092201E13124403C35
2488078D349100F02092201
data save mytrace.pm3
AM / STT / 32, get the repeating hex.
Can you elaborate a bit? do I have to run a command, I'd love to try what you said
]]>http://www.proxmark.org/forum/viewtopic.php?id=2795
What you guys suggest?
]]>Hope this gives you a clue
]]>data print x
Checking for Unknown tags:
Possible Auto Correlation of 1152 repeating samples
Found Sequence Terminator - First one is shown by orange and blue graph markers
Using Clock:32, Invert:0, Bits Found:513
ASK/Manchester - Clock: 32 - Decoded bitstream:
00110100100100010
0011000111100001
0000100100100010
0000000111100001
0011100100100010
0000000111100001
0000100100100010
0011000111100001
0000100100100010
0000000111100001
0011100100100010
0000000111100001
0000100100100010
0011000111100001
0000100100100010
0000000111100001
0011100100100010
0000000111100001
0011100100100010
0000000111100001
0011100100100010
0011000111100001
0000100100100010
0000000111100001
0000100100100010
0011000111100001
0000100100100010
0011000111100001
0000100100100010
0000000111100001
0000100100100010
000001111100001
Unknown ASK Modulated and Manchester encoded Tag Found!
if it does not look right it could instead be ASK/Biphase - try 'data rawdemod ab'
proxmark3> data raw demod ab
unknown modulation entered - see help ('h') for parameter structure