PAC Ops? (DESFire?)

Hi,

I’m trying to emulate a PAC OPS fob, that supposedly uses 4K Mifare DESFire EV1.

Instead of detecting the fob as such, the FZ just detects as an Unknown ISO tag 14443-4 NFC-A.
But with ATQA 03 44 / SAK 20
Any clues or possible support for those fobs?

Tag image :

Thanks

After a glance on their website, not all the fobs are DESFire, other chips are possible.

  • Emulating just what can be read?
  • NFC -> Extra Options -> Read Specific Card Type -> Mifare DESFire?

The other type for lite is mifare classic but that’s not the case either.
Plus the ATQA / SAK match DESfire EV1, so I’m wondering why Flipper doesn’t detect it directly?

No, I don’t get anything when manually selecting a DESFire read either. I am wondering if there is some sort of propriety protocol that could be investigated.

And of course, no, just emulating the UID doesn’t work on the reader.

Pretty plausible. With Proxmark it may be possible to sniff tag-reader communication, but Flipper can’t.