That binwalk is from the compressed image, it is not very useful. Uncompressed binwalk readily identifies a number of EXT4 file systems and the kernel location.
And there are a number of ANDROID! bootimg partitions too. Although no, there are mentions of "ANDROID!" strings, but not the actual sections. File systems appear to be real though.
This should be highly hackable.