Don-T
Your question Isn't specific , You need to paste a sample of the encrypted data you got to Identify If It's a public algorithm or custom one.
If you sniffed data through wireless from a POS then you need to get the model of the POS used and based on that can find If It's possible or not possible to decrypt the data.
but from what I saw dumps are decrypted In most cases