Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0xDF | Y(1): b1101, K: 15 (historical bytes) |
TA(1) = 0x18 | Fi=372, Di=12, 31 cycles/ETU (129032 bits/s at 4.00 MHz, 161290 bits/s for fMax=5 MHz) |
TC(1) = 0xFF | Extra guard time: 255 (special value) |
TD(1) = 0x81 | Y(i+1) = b1000, Protocol T=1 |
---- | |
TD(2) = 0xF1 | Y(i+1) = b1111, Protocol T=1 |
---- | |
TA(3) = 0xFE | IFSC: 254 |
TB(3) = 0x43 | Block Waiting Integer: 4 - Character Waiting Integer: 3 |
TC(3) = 0x00 | Error detection code: LRC |
TD(3) = 0x3F | Y(i+1) = b0011, Protocol T=15 |
---- | |
TA(4) = 0x03 | Clock stop: not supported - Class accepted by the card: (3G) A 5V B 3V |
TB(4) = 0x83 | RFU |
---- | |
Historical bytes | 4D 49 46 41 52 45 20 50 6C 75 73 20 53 41 4D |
Category indicator byte: 0x4D | (proprietary format) "IFARE Plus SAM" |
TCK = 0x3B | correct checksum |
Possibly identified card:
3B DF 18 FF 81 F1 FE 43 00 3F 03 83 4D 49 46 41 52 45 20 50 6C 75 73 20 53 41 4D 3B
NXP SAM AV2 module
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.
My blog contains a serie of artickes about ATR bytes.