Smart card ATR parsing

Enter an ATR (Answer To Reset) and I will parse it for you.

Results

Parsing ATR:

3B DF 18 FF 81 F1 FE 43 00 3F 03 83 4D 49 46 41 52 45 20 50 6C 75 73 20 53 41 4D 3B
TS = 0x3BDirect Convention
T0 = 0xDFY(1): b1101, K: 15 (historical bytes)
TA(1) = 0x18Fi=372, Di=12, 31 cycles/ETU (129032 bits/s at 4.00 MHz, 161290 bits/s for fMax=5 MHz)
TC(1) = 0xFFExtra guard time: 255 (special value)
TD(1) = 0x81Y(i+1) = b1000, Protocol T=1
----
TD(2) = 0xF1Y(i+1) = b1111, Protocol T=1
----
TA(3) = 0xFEIFSC: 254
TB(3) = 0x43Block Waiting Integer: 4 - Character Waiting Integer: 3
TC(3) = 0x00Error detection code: LRC
TD(3) = 0x3FY(i+1) = b0011, Protocol T=15
----
TA(4) = 0x03Clock stop: not supported - Class accepted by the card: (3G) A 5V B 3V
TB(4) = 0x83RFU
----
Historical bytes4D 49 46 41 52 45 20 50 6C 75 73 20 53 41 4D
Category indicator byte: 0x4D (proprietary format) "IFARE Plus SAM"
TCK = 0x3Bcorrect checksum

Possibly identified card:

3B DF 18 FF 81 F1 FE 43 00 3F 03 83 4D 49 46 41 52 45 20 50 6C 75 73 20 53 41 4D 3B

NXP SAM AV2 module

Canonical URL JSON output

Again

Submit another ATR


See also

The parsing code is part of pyscard and is available at parseATR.py.

The list of known ATR is also available online at smartcard_list.txt.

My blog contains a serie of artickes about ATR bytes.