Smart card ATR parsing

Enter an ATR (Answer To Reset) and I will parse it for you.

Results

Parsing ATR:

3B D5 96 FF 81 91 FE 1F C3 43 32 33 30 30 CC
TS = 0x3BDirect Convention
T0 = 0xD5Y(1): b1101, K: 5 (historical bytes)
TA(1) = 0x96Fi=512, Di=32, 16 cycles/ETU (250000 bits/s at 4.00 MHz, 312500 bits/s for fMax=5 MHz)
TC(1) = 0xFFExtra guard time: 255 (special value)
TD(1) = 0x81Y(i+1) = b1000, Protocol T=1
----
TD(2) = 0x91Y(i+1) = b1001, Protocol T=1
----
TA(3) = 0xFEIFSC: 254
TD(3) = 0x1FY(i+1) = b0001, Protocol T=15
----
TA(4) = 0xC3Clock stop: no preference - Class accepted by the card: (3G) A 5V B 3V
----
Historical bytes43 32 33 30 30
Category indicator byte: 0x43 (proprietary format) "2300"
TCK = 0xCCcorrect checksum

Possibly identified card:

3B D5 96 FF 81 91 FE 1F C3 43 32 33 30 30 CC

HID Global - Crescendo C2300 (PKI)

https://www.hidglobal.com/products/cards-and-credentials/crescendo/c2300

Canonical URL JSON output

Again

Submit another ATR


See also

The parsing code is part of pyscard and is available at parseATR.py.

The list of known ATR is also available online at smartcard_list.txt.

My blog contains a serie of artickes about ATR bytes.