Nice. Your Android phone has an NFC reader chip inside that cannot read the memory contents of a classic mifare chip because it lacks a license for crypto-1 … this is why you don’t actually see the memory sectors… but we do see enough to know an xM1 or flexM1 should work as a clone target… just need a proxmark3.
You can see the Kaba data set recognized by TagInfo so your system is a Kaba access control sysyem and the card will have to be fully cracked and cloned by the proxmark3… easy enough though… check the last vid on this page