40 bit AWID fob clone

Hey All,

Got an AWID fob I’m interested in potentially cloning to a T5577 card, but it’s detected as a 40 bit, which is not one of the formats the proxmark recognizes. Anyone encountered one of these in the wild before?

Below is what I get out of lf search:

[usb] pm3 --> lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=] 
[=] Checking for known tags...
[=] 
[+] AWID - len: 40 -unknown- (16108) - Wiegand: 9999999999, Raw: 012345678901234567890123

[+] Valid AWID ID found!

[+] Chipset detection: T55xx

Looks like t5577 chip though? Try lf t5 detect command to confirm.

If it is then you should be able to dump it and do a restore to the card

Thanks for the reply Amal, Looks like it is indeed a t5:

[usb] pm3 --> lf t5 detect
[=]  Chip type......... T55x7
[=]  Modulation........ FSK2a
[=]  Bit rate.......... 4 - RF/50
[=]  Inverted.......... Yes
[=]  Offset............ 33
[=]  Seq. terminator... No
[=]  Block0............ 00107060 (auto detect)
[=]  Downlink mode..... default/fixed bit length
[=]  Password set...... No

Looks like that did it!

Did and lf t5 dump and an lf t5 restore and the test card is reading back the same data as the original fob. Now to try it on an actual reader!

Thanks for the nudge in the right direction

3 Likes

Hey, I have the same problem but the method doesn’t seem to be working. When I do dump and restore with the same file, my card/chip becomes an Indala card with different data. Could you please help me?

Often times when people say they have the “same problem”, there are actual differences. Let’s start at the top. What source card or fob do you have? By this I mean what chip is in your source fob or card that you want to clone? What commands are you using to determine this?

1 Like

I figured it out using another method, thanks!

Yay! What was the issue?

The fc code was unknown so I just copied the raw data into line 1,2 & 3. This cloned the card.

1 Like