Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0xD5 | Y(1): b1101, K: 5 (historical bytes) |
TA(1) = 0x96 | Fi=512, Di=32, 16 cycles/ETU (250000 bits/s at 4.00 MHz, 312500 bits/s for fMax=5 MHz) |
TC(1) = 0xFF | Extra guard time: 255 (special value) |
TD(1) = 0x81 | Y(i+1) = b1000, Protocol T=1 |
---- | |
TD(2) = 0x91 | Y(i+1) = b1001, Protocol T=1 |
---- | |
TA(3) = 0xFE | IFSC: 254 |
TD(3) = 0x1F | Y(i+1) = b0001, Protocol T=15 |
---- | |
TA(4) = 0xC3 | Clock stop: no preference - Class accepted by the card: (3G) A 5V B 3V |
---- | |
Historical bytes | 43 32 33 30 30 |
Category indicator byte: 0x43 | (proprietary format) "2300" |
TCK = 0xCC | correct checksum |
Possibly identified card:
3B D5 96 FF 81 91 FE 1F C3 43 32 33 30 30 CC
HID Global - Crescendo C2300 (PKI)
https://www.hidglobal.com/products/cards-and-credentials/crescendo/c2300
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.