I have no experience in writing OpenXC firmware but I guess once you can decode the raw CAN bus messages then you only put the mappings (correct value translations) into the firmware. You simply need to get the data for the "dashboard values" (
https://github.com/openxc/openxc-message-format) from CAN bus. So decoding the CAN IDs and its values it a crucial step here and will involve pure reverse engineering. You can use some other device to decode the values (ELM 327, OBDLink devices etc.) - they may be quite powerful for reverse engineering. An example of the process may be here:
http://www.electronicsworkshop.eu/FordMondeoCANhacking Hope that the CAN data bytes of messages are not encrypted somehow - on the older cars I guess they usually were not.
There may also be a higher-level SW that is helpful - like this CAN Monitor Pro (
https://www.youtube.com/watch?v=Q0i_Z3Vzi7U) where you can reverse engineer the data easier. However, I guess quite a lot of effort will be needed to get the complete dashboard values. However, Id love to see someone doing that...