It probably uses Calypso standard (often used in transport systems) which is proprietary and actually undisclosed to public (for what know you need to be a transport service provider and you must pay to have it). If you want to study/reversing it you need to know the command set; you can get some info sniffing transaction but it will be an hard work.
It seems to be a dual interface smartcard and the data you sniffed are (or seem to be) a smartcard apdu communication transaction (commands that can be send via contact interface embedded inside a rfid commandset); it is good that you managed to sniff.
You should try to sniff the very beginning of the transaction and see if the byte "E0" comes out.
If you have a smartcart (contact!) reader I can give you some commands to be tested.
You need the correct compiled file for your exact kernel, other versions will not work. You need To compile it yourself if you are not able To find Someone who already compiled it.
Do not try the ones contained in my packet with a kernel different from the ones tested, they will not work.
This forum is getting populated by I-want-to-fraud people (from experience italians to fraud, chinese people to make money) because too many good people here are kind enough to answer almost every question; my help will not be given anymore to them anyway each user is responsible for the help given so, siop, you can try to explain how stuff seems to be going on but you cannot force people not to giving help, you can only "suggest".