HID Corporate 1000 48-bit card to NExT invalid format

Hi! I have commented out the lines from the source code of implant to sort out the wiegand calculation bug, recompiled, and it works, no error during cloning like before. but if I read my neXt implant after this its a false positive Indala ID, and always changing the data. chip is t55xx. here is the output:
Same issue if I write raw data.

[usb] pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[+] [C1k48s ] HID Corporate 1000 48-bit std FC: 2XX CN: 53XXXX parity ( ok )
[=] found 1 matching format
[+] DemodBuffer:
[+] 1D96A9555555555555555556A5555555A5AXXXXXXXXXXXX

[=] raw: 09e000000001XXXXXXXXXXXX

[+] Valid HID Prox ID found!

[=] Couldn’t identify a chipset

[usb] pm3 → lf hid clone -w C1k48s --fc 2XX --cn 53XXXX
[=] Preparing to clone HID tag
[+] [C1k48s ] HID Corporate 1000 48-bit std FC: 2XX CN: 53XXXX parity ( ok )
[=] Done
[?] Hint: try lf hid reader to verify

[usb] pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[=] Odd size, false positive?
[+] Indala (len 106) Raw: 8000000000000000004089000000000000408900002ffffffffffff7

[+] Valid Indala ID found!

[=] Couldn’t identify a chipset
[usb] pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[=] Odd size, false positive?
[+] Indala (len 203) Raw: 8000000000000400000a00000044000aaa55555555555555555554aa

[+] Valid Indala ID found!

[=] Couldn’t identify a chipset
NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[=] Odd size, false positive?
[+] Indala (len 112) Raw: 8000000000003000008000010000005fffffff7fffcfff7ffffffbea

[+] Valid Indala ID found!

If I clone an EM410x the output is this:
pm3 → lf search

[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[+] EM 410x ID 1600418DE7
[+] EM410x ( RF/64 )
[=] -------- Possible de-scramble patterns ---------
[+] Unique TAG ID : 680082B1E7
[=] HoneyWell IdentKey
[+] DEZ 8 : 04296167
[+] DEZ 10 : 0004296167
[+] DEZ 5.5 : 00065.36327
[+] DEZ 3.5A : 022.36327
[+] DEZ 3.5B : 000.36327
[+] DEZ 3.5C : 065.36327
[+] DEZ 14/IK2 : 00094493576679
[+] DEZ 15/IK3 : 000446685164007
[+] DEZ 20/ZK : 06080000080211011407
[=]
[+] Other : 36327_065_04296167
[+] Pattern Paxton : 374721511 [0x1655CBE7]
[+] Pattern 1 : 8530807 [0x822B77]
[+] Pattern Sebury : 36327 65 4296167 [0x8DE7 0x41 0x418DE7]
[=] ------------------------------------------------

[+] Valid EM410x ID found!

[usb] pm3 → lf t55xx detect
[=] Chip type… T55x7
[=] Modulation… FSK2a
[=] Bit rate… 4 - RF/50
[=] Inverted… Yes
[=] Offset… 34
[=] Seq. terminator… No
[=] Block0… 001070C0 (auto detect)
[=] Downlink mode… default/fixed bit length
[=] Password set… No

this is the output after hid clone
Cannot figure out the problem. raw clone also end up with the same weird indala card
Thank you!

obfuscating the real values makes it difficult for me to help you. there are a few ways to do this but it’s necessary to have the information on hand. none of the information stored on this kind of card format has any PII

You need the real values? Or problem with the original card?

need the real value that you replaced with xs

DM’d you with the answer but for those in a similar spot, C1k48s has a preamble in its raw string, you find the first 1 in sequence and go from there none of this 09e bullshit :slight_smile: