One image alone is insufficient to decode the pattern. Most sequences are made partly from an address and partly from data, the first thing to do is compare the sequences from all the keys to find out which part is constant (the address) and which part is different from one key to the next (the data). Repeat the process several times and compare the first and subsequent presses of the same key to make sure you get the same sequence. Some sequences, for example RC5 have a "first press or repeat" bit which is changed after the first press of the key to indcate it has been held down rather than released and re-pressed, comparing waveforms will demonstrate this and give a strong clue it may be RC5. Also consider that RC5 and RC6 protocols are licensed so some manufacturers avoid them to save costs.
Also consider that most protocols are protected, typically by sending the same data twice but with the data inverted second time. This is not the same as inverting the waveform you are monitoring, it means the bit that created the waveform is reversed so whatever produces a '1' pattern in your waveform produces a '0' pattern instead and vice versa.
How did you extract the waveform you show? Is it IR or RF and did you monitor at the sending end or receiving end?
Brian.