android - Card emulation Mifare -


based on this article, i'm trying emulate mifare card managing apdu on android.according apdu receive, application should answer right apdu, simulating mifare behaviour.

with rfidiot.py, reading mifare card give me :

>  ff ca 00 00 00 <  cd ea 7d 2b 90 0      tag id: cdea7d2b     atr: 3b8f8001804f0ca000000306030001000000006a    setting mifare key a: ffffffffffff    authenticating sector 00 mifare key (ffffffffffff)  >  ff 82 20 00 06 ff ff ff ff ff ff <  []  90 0  >  ff 88 00 00 60 00 <  []  90 0      ok    dumping data blocks 01 01:  >  ff 88 00 01 60 00 <  []  90 0  >  ff b0 00 01 01 <  []  6c 10 >  ff b0 00 01 10 <  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 0      01: 00000000000000000000000000000000 ................ 

with app simulating card got wrong comportment:

>  ff ca 00 00 00 <  08 f0 82 65 90 0      tag id: 08f08265     atr: 3b80800101    setting mifare key a: ffffffffffff    authenticating sector 00 mifare key (ffffffffffff)  >  ff 82 20 00 06 ff ff ff ff ff ff <  []  90 0  >  ff 88 00 00 60 00 <  []  90 0      ok    dumping data blocks 01 01:  >  ff 88 00 01 60 00 <  []  90 0  >  ff b0 00 01 01 <  []  69 81     failed: command incompatible file structure 

an error appear on ff b0 00 01 01 apdu command. , don't know 6981 apdu command comes from..

does can me on "bug" ?

it not possible trying do... @nikolayelenkov has done emulate iso 7816-4 compliant card. mifare classic not iso 7816-4 compliant (it not use apdu commands , responses communication). in fact, not iso 14443-4 compliant: uses proprietary encryption on top of iso 14443-3.

the fact communication looks apdus reader side, because reader strips off encryption before passes data on , wraps data inside "virtual" apdus. in way, mifare cards can used software can deal iso 7816-4 compliant cards.


Comments