Cloning HID Prox ID to T5577

I just got a Proxmark3 and updated and installed all the relevant software. I’m attempting to clone my student ID to a T5577 chipped card.

Here is the card in question, it reads as a EM4305 chip

[usb] pm3 --> lf hid read
hid preamble detected                                                                                                   
[+] [C1k35s  ] HID Corporate 1000 35-bit std    FC: xxxx  CN: yyyyyy  parity ( ok ) 
[=] found 1 matching format                                                                                             
[+] DemodBuffer:                                                                                                        
[+] xxxxxxxxxxxxxxxxxxxxxxxxxxx

[=] raw: 00000000000000xxxxxxxxxx

After reading I place the T5577 on the lf reader and use

lf hid clone -w C1k35s --fc xxxx --cn yyyyyy

Then run

lf hid read

and nothing outputs, the card is blank

The card I am trying to clone is password locked but I don’t think that’s the issue

This is the info on the card I am cloning to, it does say T55xx chip but it also says EM410x

[usb] pm3 --> lf search
[=] NOTE: some demods output possible binary                                                                            
[=] if it finds something that looks like a tag                                                                        
[=] False Positives ARE possible                                                                                        
[=]                                                                                                                     
[=] Checking for known tags...                                                                                          
[=]                                                                                                                     
[+] EM 410x ID 0000000001                                                                                               
[+] EM410x ( RF/64 )                                                                                                    
[=] -------- Possible de-scramble patterns ---------                                                                    
[+] Unique TAG ID      : 0000000080                                                                                     
[=] HoneyWell IdentKey                                                                                                  
[+]     DEZ 8             : 00000001                                                                                       
[+]     DEZ 10           : 0000000001                                                                                     
[+]     DEZ 5.5          : 00000.00001                                                                                    
[+]     DEZ 3.5A        : 000.00001                                                                                      
[+]     DEZ 3.5B        : 000.00001                                                                                      
[+]     DEZ 3.5C        : 000.00001                                                                                     
[+]     DEZ 14/IK2     : 00000000000001                                                                                
[+]     DEZ 15/IK3     : 000000000000128                                                                                
[+]     DEZ 20/ZK      : 00000000000000000800                                                                           
[=]                                                                                                                    
[+] Other                   : 00001_000_00000001                                                                             
[+] Pattern Paxton    : 1326593 [0x143E01]                                                                             
[+] Pattern 1             : 512 [0x200]                                                                                    
[+] Pattern Sebury    : 1 0 1  [0x1 0x0 0x1]                                                                           
[=] ------------------------------------------------ 
[+] Valid EM410x ID found! 
[+] Chipset detection: T55xx                                                                                            
[?] Hint: try `lf t55xx` commands

can you DM me (either on here or on discord) the values so i can test to see if it works for me, then i can craft you a working command

Hi! I have almost the same issue. if I read my neXt implant after this its a false positive Indala ID, and always changing the data. chip is t55xx. here is the output:

[usb] pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[+] [C1k48s ] HID Corporate 1000 48-bit std FC: 2XX CN: 53XXXX parity ( ok )
[=] found 1 matching format
[+] DemodBuffer:
[+] 1D96A9555555555555555556A5555555A5AXXXXXXXXXXXX

[=] raw: 09e000000001XXXXXXXXXXXX

[+] Valid HID Prox ID found!

[=] Couldn’t identify a chipset

[usb] pm3 → lf hid clone -w C1k48s --fc 2XX --cn 53XXXX
[=] Preparing to clone HID tag
[+] [C1k48s ] HID Corporate 1000 48-bit std FC: 2XX CN: 53XXXX parity ( ok )
[=] Done
[?] Hint: try lf hid reader to verify

[usb] pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[=] Odd size, false positive?
[+] Indala (len 106) Raw: 8000000000000000004089000000000000408900002ffffffffffff7

[+] Valid Indala ID found!

[=] Couldn’t identify a chipset
[usb] pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[=] Odd size, false positive?
[+] Indala (len 203) Raw: 8000000000000400000a00000044000aaa55555555555555555554aa

[+] Valid Indala ID found!

[=] Couldn’t identify a chipset
NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[=] Odd size, false positive?
[+] Indala (len 112) Raw: 8000000000003000008000010000005fffffff7fffcfff7ffffffbea

[+] Valid Indala ID found!

If I clone an EM410x the output is this:
pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[+] EM 410x ID 1600418DE7
[+] EM410x ( RF/64 )
[=] -------- Possible de-scramble patterns ---------
[+] Unique TAG ID : 680082B1E7
[=] HoneyWell IdentKey
[+] DEZ 8 : 04296167
[+] DEZ 10 : 0004296167
[+] DEZ 5.5 : 00065.36327
[+] DEZ 3.5A : 022.36327
[+] DEZ 3.5B : 000.36327
[+] DEZ 3.5C : 065.36327
[+] DEZ 14/IK2 : 00094493576679
[+] DEZ 15/IK3 : 000446685164007
[+] DEZ 20/ZK : 06080000080211011407
[=]
[+] Other : 36327_065_04296167
[+] Pattern Paxton : 374721511 [0x1655CBE7]
[+] Pattern 1 : 8530807 [0x822B77]
[+] Pattern Sebury : 36327 65 4296167 [0x8DE7 0x41 0x418DE7]
[=] ------------------------------------------------

[+] Valid EM410x ID found!

[usb] pm3 → lf t55xx detect
[=] Chip type… T55x7
[=] Modulation… FSK2a
[=] Bit rate… 4 - RF/50
[=] Inverted… Yes
[=] Offset… 34
[=] Seq. terminator… No
[=] Block0… 001070C0 (auto detect)
[=] Downlink mode… default/fixed bit length
[=] Password set… No

this is the output after hid clone
Cannot figure out the problem. raw clone also end up with the same weird indala card|