Smart card ATR parsing

Enter an ATR (Answer To Reset) and I will parse it for you.

Results

Parsing ATR:

3B 81 80 01 80 80
TS = 0x3BDirect Convention
T0 = 0x81Y(1): b1000, K: 1 (historical bytes)
TD(1) = 0x80Y(i+1) = b1000, Protocol T=0
----
TD(2) = 0x01Y(i+1) = b0000, Protocol T=1
----
Historical bytes80
Category indicator byte: 0x80 (compact TLV data object)
TCK = 0x80correct checksum

Possibly identified card:

3B 81 80 01 80 80

RFID - ISO 14443 Type A - NXP DESFire or DESFire EV1 or EV2

"Reiner LoginCard" (or "OWOK", how they name it) - they have been distributed by a german computer magazine ("Computer BILD")

https://cardlogin.reiner-sct.com/

Belgium A-kaart (Antwerp citycard)

Oyster card - Transport for London (second-gen "D")

https://en.wikipedia.org/wiki/Oyster_card

Kaba Legic Advant 4k

Sydney Opal card public transport ticket (Transport)

https://www.opal.com.au

TH Köln (University of Applied Sciences Cologne) - Student Identity Card

https://www.th-koeln.de/en/academics/multica_5893.php

German red cross blood donation service

http://www.blutspende-nordost.de/

Greater Toronto/Hamilton/Ottawa PRESTO contactless fare card

http://en.wikipedia.org/wiki/Presto_card

Electric vehicle charging card of the EMSP EnBW Energie Baden-Württemberg AG, Tarif ADAC e-Charge, Germany

Canonical URL JSON output

Again

Submit another ATR


See also

The parsing code is part of pyscard and is available at parseATR.py.

The list of known ATR is also available online at smartcard_list.txt.

My blog contains a serie of artickes about ATR bytes.

More documentation: