Hello @sachakeystone
Hope you are doing well.
According to NTAG 424 DNA Data Sheet, Section 10.3, 0x9140 corresponds to NO_SUCH_KEY -> Invalid key number specified.
You should be able to authenticate (AuthenticateEV2First) the tag by using Key number 00h, which should be an AES-128, all 0's by default. Also, a personalization procedure is described in NTAG 424 DNA and NTAG 424 DNA TagTamper features and hints, Chapter 5, which describes and breaks-down the PICC activation, File selection, Authentication, among others. Please, use it as a reference for your application.
I will strongly recommend you using RFIDDiscover, which is a tool for testing and configuring the tags and cards based on our devices, that allows you to log the relevant data exchange. It is also recommended using PEGODA Contactless Smart Card Reader | NXP Semiconductors together with this tool. Something important to remark is that RFID Discover is secured under NDA; you can try requesting an NDA directly from the NDA online form. After this, you must request the tool through the Secure Files (Secure Access Rights FAQs | NXP Semiconductors).
For quick testing, you could use TagWriter; this app allows you to read, write, write-protect and erase (if available) your Tags.
Additionally, NFC TagInfo by NXP reads the Meta information and data from contactless RFID and NFC transponders. This allows you to see what technology is enabling your contactless cards. This app should help you identify applications contained on your cards and tags, identify IC types and IC manufacturer and read out and display the complete tag memory layout.
Regards,
Eduardo.