Thanks for the advice which is always true, but not of much help.
The received Cluster ID is 00 00
The received Profile ID is 01 04 (Home Automation)
The first few bytes can be decoded as :
1C - Frame type (cluster specific,direction & def. resp)
5F11 - manufacture code
4B - transaction sequence
0A - command identifier (since its cluster specific, I
do not know how to decode it - the table I see is
only for Commands across the entire profile).
The rest are the ZCL Payload : where in the documentations can I find the parsing of these bytes?
Has anyone written a parser program that can do the job?