@Edent do you have the dumps from the USB sniffer anywhere? That together with the datasheet for the UART bridge and the image contents associated with the dump might be enough to get started.

Does the windows app create any intermediate files that could be analyzed? If you could snag the binary images that get dumped to the badge it might help to separate command data from contents. At that point you wouldn't need to know what specifically the command does, just repeat it with your own data.