This app was mentioned in 4 comments, with an average of 4.00 upvotes
Internal NFC tag? If so,I'm not sure you'd want to write that even if you could- only because it may mess up compatibility with other phones... but I guess that's only a minor issue at best.
I used to use Tagstand NFC Writer. That app always did what I want without any issues (but I haven't used it in over a year). Great part is for you is that I know for a fact that it has Tasker tasks shortcuts built in.
A much better way, as suggested by /u/trump4resident, would be to get some NFC tags. You can buy them for cheap on Amazon.
Get yourself some NFC tags
Download Tagstand Writer
Go to the YouTube app, find the video you want people to see
Hit the share button
Find Tagstand Writer, share with that app
Write the task onto your NFC tag
Repeat for any video you want to show
I tested the procedure and it works.
One thing, though, YouTube is not supported on the stock Gear VR software. You'll need to disable Gear VR service on your phone using an app like Package Disabler Pro or the simpler CB enabler for Gear VR. It'll make your phone believe that your Gear VR is a Google Cardboard device, and YouTube will therefore work on it.
If you have any question, ask away!
If you want a clone of the card then you want both the UID and the data on the card to be copied across to the new card, however this isn’t normally possible due to the UID being read only.
Fix: Alter the UID
The article I found below where someone used proxmark v3 software to clone a mifare classic 1k Classic Fob says to:
Enter the “UID changeable”, aka “Chinese backdoor” (seriously) cards, which allows you to change their UID.
https://www.gavinjl.me/proxmark-3-cloning-a-mifare-classic-1k/
Fixing a broken card:
Situation: you wanted to clone a Mifare Desfire card but didn’t have an identical card to copy it to – you only have a Mifare Classic 1K. You also couldn’t read the complete card as you didn’t have the key to authenticate, so all you could usefully get was the UID.
Some research suggested a small chance that just using the UID might be enough to get past a secure door if there was a (very) sloppy implementation. We copied that UID (10 bytes) to a Mifare Classic 1K card (which uses a 7 byte UID). The difference in UID size was another indication that this was very unlikely to work. it didn’t work. Doing this left our Mifare Classic card in a state where the Proxmark wouldn’t even read it, so to fix that we open the proxmark command prompt and type:
proxmark3> hf mf cwipe 1 w f
Use the following resources to help guide you:
https://scund00r.com/all/rfid/2018/06/05/proxmark-cheatsheet.html
https://github.com/Proxmark/proxmark3/wiki/commands
Mifare Classic help: https://store.ryscc.com/blogs/news/35894145-emulating-a-mifare-classic-1k-tag-with-the-proxmark3
Mifare Classic Universal Toolkit (MFCUK): https://github.com/nfc-tools/mfcuk
Mifare Classic Offline Cracker (MFOC): https://github.com/nfc-tools/mfoc
NFC Writer: https://play.google.com/store/apps/details?id=com.tagstand.writer&hl=en\_GB