Newbie question- HID? card to t55x cloning

I’m trying to clone a new access card I received from work, to a blank t55xx fob, but I’m not sure which data actually gets cloned, HID, Indala Optus, etc? Is it even possible to clone it?

hid preamble detected
[+] [H10306 ] HID H10306 34-bit FC: XXXXX CN: XXXXX parity ( fail )
[+] [N10002 ] Honeywell/Northern N10002 34-bit FC: XXXXX CN: XXXXX parity ( fail )
[+] [Optus34 ] Indala Optus 34-bit FC: XXXX CN: XXXXX
[+] [SMP34 ] Cardkey Smartpass 34-bit FC: XXXX CN: XXXXX Issue: 3
[+] [BQT34 ] BQT 34-bit FC: XX CN: XXXXXXXX parity ( fail )
[=] found 5 matching formats
[+] DemodBuffer:
[+] 1D555A6966565A6A9A9A6695

[=] raw: 00000000000000XXXXXXXXd8

[+] Valid HID Prox ID found!

[+] Chipset detection: EM4x05 / EM4x69
[?] Hint: try lf em 4x05 commands
[usb] pm3

Additional info from em 4x05 dump if needed:

Summary

[usb] pm3 → lf em 4x05 chk

[+] loaded 122 keys from dictionary file C:\working\ProxSpace\pm3\proxmark3\client\dictionaries/t55xx_default_pwds.dic
[=] press to exit
[=] testing 51243648
[=] testing 000D8787
[=] testing 19920427
[=] testing 50524F58
[+] found valid password [ 50524F58 ]

[+] time in check pwd 1 seconds

lf em 4x05 dump -f myfile -p 11223344

[usb] pm3 → lf em 4x05 dump -p 50524F58
[=] Found a EM4305 tag
[=] password is correct

[=] Addr | data | ascii |lck| info
[=] -----±---------±------±–±----
[=] 00 | 00040072 | …r | | Info/User
[=] 01 | 789AE2FC | x… | x | UID
[=] 02 | 50524F58 | PROX | | Password
[=] 03 | 0000BB3A | …: | | User
[=] 04 | 003DC258 | .=.X | | Config
[=] 05 | 69A55547 | i.UG | | User
[=] 06 | A9A59599 | … | | User
[=] 07 | 5699A6A6 | V… | | User
[=] 08 | 00000000 | … | | User
[=] 09 | 00000000 | … | | User
[=] 10 | 00000000 | … | | User
[=] 11 | 00000000 | … | | User
[=] 12 | 00000000 | … | | User
[=] 13 | 00000000 | … | | User
[=] 14 | 00008002 | … | | Lock active
[=] 15 | 00000000 | … | | Lock

This seems odd. What firmware and client version are you using?

Is the output from my work access card odd?

From the output below, I believe I’m on Iceman v4

MCU… AT91SAM7S512 Rev A
Memory… 512 Kb ( 59% used )

Client.... Iceman/master/v4.14831-972-g3e7c0f4c4 2022-10-04 14:57:48
Bootrom... Iceman/master/v4.14831-972-g3e7c0f4c4 2022-10-04 14:57:22
OS........ Iceman/master/v4.14831-972-g3e7c0f4c4 2022-10-04 14:57:28
Target.... PM3 GENERIC

hmm ok. can you send a full screenshot of the output of lf search for your work access card?

Did you try running “lf hid clone -r XXXXXXXXd8”?
With the t55xx fob on the reader