Smart card ATR parsing

Enter an ATR (Answer To Reset) and I will parse it for you.

Results

Parsing ATR:

3B 7F 96 00 00 80 31 80 65 B0 85 05 00 39 12 0F FE 82 90 00
TS = 0x3BDirect Convention
T0 = 0x7FY(1): b0111, K: 15 (historical bytes)
TA(1) = 0x96Fi=512, Di=32, 16 cycles/ETU (250000 bits/s at 4.00 MHz, 312500 bits/s for fMax=5 MHz)
TB(1) = 0x00VPP is not electrically connected
TC(1) = 0x00Extra guard time: 0
----
Historical bytes80 31 80 65 B0 85 05 00 39 12 0F FE 82 90 00
Category indicator byte: 0x80 (compact TLV data object)
Tag: 3, Len: 1 (card service data byte)
Card service data byte: 128
- Application selection: by full DF name
- EF.DIR and EF.ATR access services: by GET RECORD(s) command
- Card with MF
Tag: 6, Len: 5 (pre-issuing data)
Data: B0 85 05 00 39 "....9"
Tag: 1, Len: 2 (country code, ISO 3166-1)
Country code: 0F FE
Tag: 8, Len: 2 (status indicator)
SW: 90 00

Possibly identified card:

3B 7F .. 00 00 80 31 80 65 B0 .. .. .. .. 12 0F FE 82 90 00

IDPrime MD 8840, 3840, 3810, 840 and 830 Cards T=0

IDPrime 930 (JavaCard)

3B 7F 96 00 00 80 31 80 65 B0 85 05 00 39 12 0F FE 82 90 00

SafeNet IDPrime 940C (eID)

https://data-protection-updates.gemalto.com/2023/10/05/safenet-etoken-5110-cc-940c-release-announcement/

Canonical URL JSON output

Again

Submit another ATR


See also

The parsing code is part of pyscard and is available at parseATR.py.

The list of known ATR is also available online at smartcard_list.txt.

My blog contains a serie of artickes about ATR bytes.