Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0xEB | Y(1): b1110, K: 11 (historical bytes) |
TB(1) = 0x00 | VPP is not electrically connected |
TC(1) = 0x00 | Extra guard time: 0 |
TD(1) = 0x81 | Y(i+1) = b1000, Protocol T=1 |
---- | |
TD(2) = 0x31 | Y(i+1) = b0011, Protocol T=1 |
---- | |
TA(3) = 0x20 | IFSC: 32 |
TB(3) = 0x45 | Block Waiting Integer: 4 - Character Waiting Integer: 5 |
---- | |
Historical bytes | 4A 43 4F 50 33 31 33 36 47 44 54 |
Category indicator byte: 0x4A | (proprietary format) "COP3136GDT" |
TCK = 0x78 | correct checksum |
Possibly identified card:
3B EB 00 00 81 31 20 45 4A 43 4F 50 33 31 33 36 47 44 54 78
card for testing (eID)
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.
My blog contains a serie of artickes about ATR bytes.