Toniebox 2 stops playing after 2 mins while emulating with Flipper

Hello, my Toniebox 1 didn’t worked anymore so I returned it in warranty and I was refunded, so I bought a Toniebox 2. I was quite surprised to notice that emulating .nfc with the Flipper would stop after 2 mins.

At first I though they implemented some anti-piracy protection.
But actually… it is the opposite. They removed the privacy protection. I was surprised I could read the paw patrol game without auth as Tommybox.

I think they had to do it because of the new games. I think they have several antenna’s and they make some polling between them because in the game you have more than one NFC. And I think with privacy mode it was impossible.

I tried a Magic SLI card from Aliexpress I had lying around, changed block size, copied UID and data from a .nfc (the new Hotwheels) and it worked. Amazing… I hope they won’t patch it :slight_smile:

exact card is : https://nl.aliexpress.com/item/1005006949791537.html?spm=a2g0o.cart.0.0.39fb38dallomHj&mp=1&pdp_npi=5%40dis!EUR!EUR%203.87!EUR%203.40!!EUR%203.40!!!%40211b617b17641926836552502ef049!12000038827379137!ct!BE!736894989!!5!0&gatewayAdapt=usa2nld4itemAdapt

Test

I don’t have Proxmod so I used an Android app called Mtools.

Then I was ok so I just have to edit the .nfc files to “convert” them to ISO15693 … but it is still crashing after 2 mins with the flipper! I tried to copy exactly my magic card with the Flipper but he reads only 0’s, he can’t handle the modifiable block size.

Why does the Toniebox still reads original Tonies that have privacy ? of course they have a legacy mode but I guess they made small changes on the timing, very tiny changes where the flipper doesn’t ACK with the exact timing required anymore.

For anyone interested, the dump of the paw patrol game is below (I replace some characters with X’s).

If anyone as an idea to make the Flipper work again let me know!

Filetype: Flipper NFC device
Version: 4

Device type can be ISO14443-3A, ISO14443-3B, ISO14443-4A, ISO14443-4B, ISO15693-3, FeliCa, NTAG/Ultralight, Mifare Classic, Mifare Plus, Mifare DESFire, SLIX, ST25TB, NTAG4xx, Type 4 Tag, EMV

Device type: SLIX

UID is common for all formats

UID: E0 04 01 09 10 9F XX XX

ISO15693-3 specific data

Data Storage Format Identifier

DSFID: 00

Application Family Identifier

AFI: 00

IC Reference - Vendor specific meaning

IC Reference: 01

Lock Bits

Lock DSFID: false
Lock AFI: false

Number of memory blocks, valid range = 1..256

Block Count: 80

Size of a single memory block, valid range = 01…20 (hex)

Block Size: 04
Data Content: XX XX 2D 37 B6 D1 47 3C A4 01 30 76 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

Block Security Status: 01 = locked, 00 = not locked

Security Status: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

SLIX specific data

SLIX capabilities field affects emulation modes. Possible options: Default, AcceptAllPasswords

Capabilities: Default

Passwords are optional. If a password is omitted, a default value will be used

Password Read: 00 00 00 00
Password Write: 00 00 00 00
Password Privacy: 0F 0F 0F 0F
Password Destroy: 0F 0F 0F 0F
Password EAS: 00 00 00 00

This is the card’s secp128r1 elliptic curve signature. It can not be calculated without knowing NXP’s private key.

Signature: XX XX B0 AB 93 E4 07 5F B8 E9 F6 D8 C3 17 65 97 65 0E D8 01 BF 3A F4 BA 8E 04 C6 F5 51 0F ED 79
Privacy Mode: false

Protection pointer configuration

Protection Pointer: 00
Protection Condition: 00

SLIX Lock Bits

Lock EAS: false
Lock PPL: falsestrong text

If you want proof emulate this file :
Filetype: Flipper NFC device
Version: 4

Device type can be ISO14443-3A, ISO14443-3B, ISO14443-4A, ISO14443-4B, ISO15693-3, FeliCa, NTAG/Ultralight, Mifare Classic, Mifare Plus, Mifare DESFire, SLIX, ST25TB, NTAG4xx, Type 4 Tag, EMV

Device type: ISO15693-3

UID is common for all formats

UID: E0 04 03 50 1A 89 17 CB

ISO15693-3 specific data

Data Storage Format Identifier

DSFID: 00

Application Family Identifier

AFI: 00

IC Reference - Vendor specific meaning

IC Reference: 8B

Lock Bits

Lock DSFID: false
Lock AFI: false

Number of memory blocks, valid range = 1..256

Block Count: 8

Size of a single memory block, valid range = 01…20 (hex)

Block Size: 04
Data Content: F3 58 92 32 CA CD 50 48 DD CE 99 F2 98 D8 FF 00 27 4F D2 CF 22 7B EA 67 C2 40 DF 79 F5 1C 50 BF

Block Security Status: 01 = locked, 00 = not locked

Security Status: 00 00 00 00 00 00 00 00

It will play for 30 secs

hi
thanks for the detailed info.
how were you able to change the block size?

size1

I use this fonctionnality of MTools

If you have a proxmark there is a command you can send also

size2

As I am new user I can only paste one image per post