MOD-RFID1356MIFARE NFC / RFID reader writer for MIFARE 13.56Mhz tags


MOD-RFID1356MIFARE is re-design of our popular RFID card readers. It’s based on NXP PN532 chip and can read and write in ISO/IEC 14443A/MIFARE tags.

Like with MOD-RFID125 and MOD-RFID1356 it’s extremly easy to use. It connects via USB to any computer and creates HID keyboard or CDC serial port. There is no need for any drivers and switching between the modes is very easy with one push button.

WiKi description explains how to use. Read distance is up to 15 cm for ISO cards. We will stock soon 4 different types of tags: ISO card, clamshell, keychain and adhesive sticker.

13 Comments (+add yours?)

  1. SK
    May 25, 2016 @ 17:59:56

    Does this support only MIFARE Classic or some of the other variants:


  2. WE
    May 26, 2016 @ 10:30:37

    It’s an interresting product. However, looking on the wiki i am a litle desapointed. The set of command seems very limited, and might not reflect many possibilities offered by the PN532.
    Unfortunately, there is no such details for the “bootloader” mode to update firmware with own created firmware. Let’s stay tune to see if more informations will be available.
    Last but not least (and mostly off topic), i take the opportunity of this message to thanks and encourage Olimex for their great work, i discover you 2 years ago, and i am really seduce by the overall spirit… I bougth my first Arduino from Olimex (thanks to amazon, shipping costs are quite substantial 😉 )
    So, thanks for all and keep providing interrestings boards !


  3. bib
    May 26, 2016 @ 20:02:14

    Apologies on my naive question … but why this is not OSHW design at Olimex ? We all expecting that Olimex designs are focused on OSHW.
    The NXP site is a bit obfuscated on “intellectual property” regarding this chip or ISO/IEC 144…

    Are we supposed to pay any fees to NXP in order to use these stuffs ?

    Please some explanations on that topic 🙂 ….

    Thx, bIB.


    • OLIMEX Ltd
      May 27, 2016 @ 11:16:00

      It’s nice to see that people wonder when we release something which is not OSHW 🙂 I can assure you we always have good reason when we do so!


    • SK
      May 27, 2016 @ 13:18:22

      I assume there may be NDAs in place (or some other form of protected IP).


    • oldpenguin
      Jun 08, 2016 @ 12:16:20

      AFAIK when you buy the chip from NXP you are already payed a license to use Mifare.
      There is plenty of doc available for this chip and sw examples.


  4. jj
    May 29, 2016 @ 04:03:23

    Some questions: 1) If I place this board right atop a LIME, will the LIME still work or will some EMI crash it? 2) If I place it atop a 2.5″ HDD, will it a) destroy data on the HDD and b) still work when sitting on the metal cover of the HDD? Tia.


  5. j
    May 29, 2016 @ 12:31:19

    You write that the microcontroller adds 3 _addintional_ modes of communication. Does this imply that it is also possible to use the PN532 directly via i2c/spi/uart? This would enable use with existing open source libraries such as libnfc/libfreefare/liblogicalaccess for applications with DESfire cards.
    What is CON1 for? Is this for direct access to the chip? Why does it have such a small pitch?

    There are a few PN532 boards available. However, the cheaper ones I tested had a bad RF design and where not able to power cryptographic funcitons in DESfire cards. The more expensive Adafruit board works, though. Have you done tests with different reading distances and crypto cards?

    I don’t really care about yet another board for reading UIDs and MIfare Classic cards. Relying on the card’s UID for security purposes (e.g. an access control system) is a very bad idea. There are cards with writable UID and cheap devices for card emulation. Likewise, Mifare Classic has been broken for years and can be cracked and spoofed even with an NFC phone.

    It would be very nice to finally see an RFID breakout board that makes it easy to build a secure solution based on DESfire cards. If you made a good RF design and the controller on your board has enough memory, someone could write a firmware with the functionality of libfreefare made accessible through your USB interface. That would be a real game-changer!


  6. j
    May 29, 2016 @ 12:33:42

    Oh, and I like that you apparently thought about the connection of an external antenna!


  7. bvernoux
    Jun 14, 2016 @ 22:09:11

    Just for information for those who want and advanced open source NFC board see HydraNFC (which required HydraBus base STM32F4@168Mhz) based on TRF7970A with advanced raeder/writer/sniffer/emulation modes for more details see


  8. darkOne
    Dec 11, 2016 @ 19:54:26

    Can you please update the firmware to be ISO14443 TypeA compliant for reading UID numbers via UART connection.
    Currently, I can read the Mifare 1k UID card by setting “e0” (4Byte UID).
    But I can not read Mifare Desfire EV1 UID (7Byte UID) – the read LED aka card read does never blink at all.
    I hope this is possible. Looking forward.


    • darkOne
      Dec 11, 2016 @ 20:21:35

      When reading Mifare Desfire EV1 card with set “e0” or “e1” I receive the following data when card is present (hd (hexdump) default dump of UART data):

      00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
      000001d0  00 00 00 00 00 00 00 00  00 45 52 52 4f 52 3a 20  |.........ERROR: |
      000001e0  44 43 53 20 65 72 72 6f  72 0a 0d                 |DCS error..|


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: