Thanks for your answers. I find the data. But now I cant recover Kc.
I take some bursts:
From packet Type "System Information Type 5"
2490723 3847297: 101100111001101001101000101000111000011010100000010010000010110000000001000101010000010000000000000010100000110100
2490724 3847330: 000011101110001010000110100000110101100000101100000000010001000001000100010001000010100000001101001011001110111000
2490725 3847363: 000000110000101000010000101101000100001100010101110010000101001000101000000101000000000000000000001000110000100011
2490726 3847396: 011010001001110001000011000100000100010000010010000010000000010110101000011000100011000100111000000000001010101000
AND encrypted bursts (number frames +204)
2490927 3847319: 000101001001110000000110001110101011000101111010010000101111100101101001111010001011001100011111011101001001100000
2490928 3847352: 000000000000110010100111010001101000000001110100100011010100001011111111110111001110011100010011110000000111110011
2490929 3847385: 001110011011111001100100010101011011110001110010010100111110010100011110100111000111111100101110101000110001110000
2490930 3847392: 110001011110000101111111010011101110000111000100110100111010100000010111110101001101100111101111001000001100111111
Make XOR
C:\python27\python.exe XOR.py 101100111001101001101000101000111000011010100000010010000010110000000001000101010000010000000000000010100000110100 000101001001110000000110001110101011000101111010010000101111100101101001111010001011001100011111011101001001100000 >>test_2.txt
101001110000011001101110100110010011011111011010000010101101010101101000111111011011011100011111011111101001010100
C:\python27\python.exe XOR.py 000011101110001010000110100000110101100000101100000000010001000001000100010001000010100000001101001011001110111000 000000000000110010100111010001101000000001110100100011010100001011111111110111001110011100010011110000000111110011 >>test_2.txt
000011101110111000100001110001011101100001011000100011000101001010111011100110001100111100011110111011001001001011
C:\python27\python.exe XOR.py 000000110000101000010000101101000100001100010101110010000101001000101000000101000000000000000000001000110000100011 001110011011111001100100010101011011110001110010010100111110010100011110100111000111111100101110101000110001110000 >>test_2.txt
001110101011010001110100111000011111111101100111100110111011011100110110100010000111111100101110100000000001010011
C:\python27\python.exe XOR.py 011010001001110001000011000100000100010000010010000010000000010110101000011000100011000100111000000000001010101000 110001011110000101111111010011101110000111000100110100111010100000010111110101001101100111101111001000001100111111 >>test_2.txt
101011010111110100111100010111101010010111010110110110111010110110111111101101101110100011010111001000000110010111
AND crack it.
1,2,3 bursts kraken didnt find.
4 it wrote me "Found 16661134333702853355x @ 23 #3 (table:238)"
I explore find_kc
./find_kc 16661134333702853355x 23 3847392 3847319 101001110000011001101110100110010011011111011010000010101101010101101000111111011011011100011111011111101001010100
and no candidate
only
73e6a26f427c6a1 -> c73e6a26f427c6a1
Framecount is 3847392
KC(0): 82 d0 fe 5b 94 ac 62 8b mismatch
Can somebody explain me where is my mistake?