Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0xF9 | Y(1): b1111, K: 9 (historical bytes) |
TA(1) = 0x13 | Fi=372, Di=4, 93 cycles/ETU (43010 bits/s at 4.00 MHz, 53763 bits/s for fMax=5 MHz) |
TB(1) = 0x00 | VPP is not electrically connected |
TC(1) = 0x00 | Extra guard time: 0 |
TD(1) = 0x81 | Y(i+1) = b1000, Protocol T=1 |
---- | |
TD(2) = 0x31 | Y(i+1) = b0011, Protocol T=1 |
---- | |
TA(3) = 0xFE | IFSC: 254 |
TB(3) = 0x45 | Block Waiting Integer: 4 - Character Waiting Integer: 5 |
---- | |
Historical bytes | 4A 43 4F 50 32 34 32 52 33 |
Category indicator byte: 0x4A | (proprietary format) "COP242R3" |
TCK = 0xA2 | correct checksum |
Possibly identified card:
3B F9 13 00 00 81 31 FE 45 4A 43 4F 50 32 34 .. .. .. ..
NXP JCOP v2.4.x (see hist bytes for more info)
Click here to enter the card description
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.
My blog contains a serie of artickes about ATR bytes.