Cloning NXP MiFare 4k keytag

What apps or cloning tools are capable of making this clone? Ive also included below the info for the tag.

** TagInfo scan (version 4.25.5) 2023-02-13 12:47:49 **
Report Type: – IC INFO ------------------------------

IC manufacturer:

NXP Semiconductors

IC type:

MIFARE Classic EV1 (MF1S70)

– NDEF ------------------------------

No NDEF data storage present:

Maximum NDEF storage size after format: 3356 bytes

– EXTRA ------------------------------

Memory size:

4 kB

  • 32 sectors of 4 blocks and 8 sectors of 16 blocks
  • 256 blocks, with 16 bytes per block

IC information:

Full product name: MF1S703xX/V1

Block 0 analysis:

UID: 1A:0D:9F:74

  • NXP Semiconductors
  • Re-used (Old) Non-Unique ID
    Check Byte: 0xFC
    SAK: 0x98
    ATQA: 0x0200
    Manufacturer data:
  • E3 19 00 20 00 00 00 22 |… …"|
    • Revision: E3
    • Fab: TSMC
    • Production date: week 19, 2022
      ~ PQE0/1: 19 22

Originality Check (asymmetric):

Originality check not supported

TagInfo Version:

Version :4.25.5

Device Info:

Device Model :samsung ( SM-G781U )
Android OS Version :13

– FULL SCAN ------------------------------

Technologies supported:

MIFARE Classic compatible
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible

Android technology information:

Tag description:

  • TAG: Tech [,,]
  • Maximum transceive length: 253 bytes
  • Default maximum transceive time-out: 618 ms

Detailed protocol information:

ID: 1A:0D:9F:74
ATQA: 0x0200
SAK: 0x18

unfortunately it’s not possible to clone DESFire EV1 or EV2 or EV3 because they use standards based encryption to protect their applications

hmm… actually on second look this is a “new” mifare classic S70 4k… we don’t have any 4k magic mifare chips to clone the entire memory contents to, but you could at least clone the 4 byte ID and the first 1k of memory sectors to the flexM1 … which I think is fully out of stock right now as we redesign the antenna for it.