Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0xF8 | Y(1): b1111, K: 8 (historical bytes) |
TA(1) = 0x18 | Fi=372, Di=12, 31 cycles/ETU (129032 bits/s at 4.00 MHz, 161290 bits/s for fMax=5 MHz) |
TB(1) = 0x00 | VPP is not electrically connected |
TC(1) = 0xFF | Extra guard time: 255 (special value) |
TD(1) = 0x81 | Y(i+1) = b1000, Protocol T=1 |
---- | |
TD(2) = 0x31 | Y(i+1) = b0011, Protocol T=1 |
---- | |
TA(3) = 0xFE | IFSC: 254 |
TB(3) = 0x45 | Block Waiting Integer: 4 - Character Waiting Integer: 5 |
---- | |
Historical bytes | 4A 43 4F 50 76 32 34 31 |
Category indicator byte: 0x4A | (proprietary format) "COPv241" |
TCK = 0x43 | correct checksum |
Possibly identified card:
3B F8 18 00 FF 81 31 FE 45 4A 43 4F 50 76 32 34 31 43
VIVOtech SAM
NXP JCOP V241
NXP J3A081 JavaCard (contact interface)
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.
My blog contains a serie of artickes about ATR bytes.