Smart card ATR parsing

Enter an ATR (Answer To Reset) and I will parse it for you.

Results

Parsing ATR:

3B 9C 97 80 11 40 52 75 74 6F 6B 65 6E 45 43 50 73 63 C0
TS = 0x3BDirect Convention
T0 = 0x9CY(1): b1001, K: 12 (historical bytes)
TA(1) = 0x97Fi=512, Di=64, 8 cycles/ETU (500000 bits/s at 4.00 MHz, 625000 bits/s for fMax=5 MHz)
TD(1) = 0x80Y(i+1) = b1000, Protocol T=0
----
TD(2) = 0x11Y(i+1) = b0001, Protocol T=1
----
TA(3) = 0x40IFSC: 64
----
Historical bytes52 75 74 6F 6B 65 6E 45 43 50 73 63
Category indicator byte: 0x52 (proprietary format) "utokenECPsc"
TCK = 0xC0correct checksum

Possibly identified card:

3B 9C 97 80 11 40 52 75 74 6F 6B 65 6E 45 43 50 73 63 C0

Aktiv Rutoken ECP 3.0 NFC (PKI)

https://www.rutoken.ru/products/all/rutoken-ecp-nfc/

Canonical URL JSON output

Again

Submit another ATR


See also

The parsing code is part of pyscard and is available at parseATR.py.

The list of known ATR is also available online at smartcard_list.txt.

My blog contains a serie of artickes about ATR bytes.