Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0x7D | Y(1): b0111, K: 13 (historical bytes) |
TA(1) = 0x94 | Fi=512, Di=8, 64 cycles/ETU (62500 bits/s at 4.00 MHz, 78125 bits/s for fMax=5 MHz) |
TB(1) = 0x00 | VPP is not electrically connected |
TC(1) = 0x00 | Extra guard time: 0 |
---- | |
Historical bytes | 80 31 80 65 B0 83 11 C0 A9 83 00 90 00 |
Category indicator byte: 0x80 | (compact TLV data object) Tag: 3, Len: 1 (card service data byte) Card service data byte: 128 - Application selection: by full DF name - EF.DIR and EF.ATR access services: by GET RECORD(s) command - Card with MF Tag: 6, Len: 5 (pre-issuing data) Data: B0 83 11 C0 A9 "....." Tag: 8, Len: 3 (status indicator) LCS (life card cycle): 0 SW: 90 00 |
Possibly identified card:
3B 7D .. 00 00 80 31 80 65 B0 .. .. .. .. 83 .. 90 00
IDClassic 3XX / Classic TPC (IXS, IS, IS V2, IS CC, IM, IM CC, IM CC V3) / MultiApp ID Cards
3B 7D 94 00 00 80 31 80 65 B0 83 11 C0 A9 83 00 90 00
GemXpresso R4 72K
National ID card of Republic of Lithuania (2007-2012)
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.
My blog contains a serie of artickes about ATR bytes.