Smart card ATR parsing

Enter an ATR (Answer To Reset) and I will parse it for you.

Results

Parsing ATR:

3B FE 18 00 00 80 31 FE 45 53 43 45 36 30 2D 43 44 30 38 31 2D 6E 46 A9
TS = 0x3BDirect Convention
T0 = 0xFEY(1): b1111, K: 14 (historical bytes)
TA(1) = 0x18Fi=372, Di=12, 31 cycles/ETU (129032 bits/s at 4.00 MHz, 161290 bits/s for fMax=5 MHz)
TB(1) = 0x00VPP is not electrically connected
TC(1) = 0x00Extra guard time: 0
TD(1) = 0x80Y(i+1) = b1000, Protocol T=0
----
TD(2) = 0x31Y(i+1) = b0011, Protocol T=1
----
TA(3) = 0xFEIFSC: 254
TB(3) = 0x45Block Waiting Integer: 4 - Character Waiting Integer: 5
----
Historical bytes53 43 45 36 30 2D 43 44 30 38 31 2D 6E 46
Category indicator byte: 0x53 (proprietary format) "CE60-CD081-nF"
TCK = 0xA9correct checksum

Possibly identified card:

3B FE 18 00 00 80 31 FE 45 53 43 45 36 30 2D 43 44 30 38 31 2D 6E 46 A9

G&D Sm@rtCafé Expert 6.0 (JavaCard)

http://www.smartcardfocus.com/shop/ilp/id~684/smartcafe-expert-6-0-80k-dual-/p/index.shtml

Canonical URL JSON output

Again

Submit another ATR


See also

The parsing code is part of pyscard and is available at parseATR.py.

The list of known ATR is also available online at smartcard_list.txt.

My blog contains a serie of artickes about ATR bytes.

More documentation: