after a quick peak at the config block against the datasheet i turned this up:
ive highlighted the two things that are of some concern but nothing huge.
identification
as a t5577 goes, this type of encoding in hotels has been seen before although uncommon (what hotel chain is this from? what readers are they using?)
(E2A:) this system isn’t using their t5577s to emulate a preexisting chipset like em410x they’re using the t5577 as the credential we just got to find out how.
it making a dud clone that doesnt work against the door is standard behaviour for this type of config but your secondary t5577 should be recoverable back to blank.
ATM theres not much you can do with this system but if you are able to aquire some reader sniff traces id happily take a look and see if there is anything that i can do with them