Do you have access to a Linux PC with a USB PC/SC reader? For reference here is a pcsc_scan
and gp -info
(from GitHub - martinpaljak/GlobalPlatformPro: 🌐 🔐 Manage applets and keys on JavaCard-s like a pro) output:
Thu May 4 02:19:25 2023
Reader 2: ACS ACR1252 Dual Reader [ACR1252 Dual Reader PICC] 00 00
Event number: 22
Card state: Card inserted,
ATR: 3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90
ATR: 3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90
+ TS = 3B --> Direct Convention
+ T0 = 8A, Y(1): 1000, K: 10 (historical bytes)
TD(1) = 80 --> Y(i+1) = 1000, Protocol T = 0
-----
TD(2) = 01 --> Y(i+1) = 0000, Protocol T = 1
-----
+ Historical bytes: 00 31 C1 73 C8 40 00 00 90 00
Category indicator byte: 00 (compact TLV data object)
Tag: 3, len: 1 (card service data byte)
Card service data byte: C1
- Application selection: by full DF name
- Application selection: by partial DF name
- EF.DIR and EF.ATR access services: by GET RECORD(s) command
- Card without MF
Tag: 7, len: 3 (card capabilities)
Selection methods: C8
- DF selection by full DF name
- DF selection by partial DF name
- Implicit DF selection
Data coding byte: 40
- Behaviour of write functions: write OR
- Value 'FF' for the first byte of BER-TLV tag fields: invalid
- Data unit in quartets: 1
Command chaining, length fields and logical channels: 00
- Logical channel number assignment: No logical channel
- Maximum number of logical channels: 1
Mandatory status indicator (3 last bytes)
LCS (life card cycle): 00 (No information given)
SW: 9000 (Normal processing.)
+ TCK = 90 (correct checksum)
Possibly identified card (using /home/christoph/.cache/smartcard_list.txt):
3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 90
NXP PN65o's Internal Secure Element in card emulation mode. (Other)
GlobalPlatformPro 18.09.14-0-gb439b52
Running on Linux 6.1.24 amd64, Java 1.8.0_362 by Oracle Corporation
Reader: ACS ACR1252 Dual Reader [ACR1252 Dual Reader PICC] 00 00
ATR: 3B8A80010031C173C8400000900090
More information about your card:
http://smartcard-atr.appspot.com/parse?ATR=3B8A80010031C173C8400000900090
[WARN] GPData - Invalid CPLC date: 4F31
CPLC: ICFabricator=4790
ICType=D321
OperatingSystemID=4700
OperatingSystemReleaseDate=0000 (2010-01-01)
OperatingSystemReleaseLevel=0000
ICFabricationDate=0323 (2010-11-19)
ICSerialNumber=41544420
ICBatchIdentifier=0094
ICModuleFabricator=0000
ICModulePackagingDate=0000 (2010-01-01)
ICCManufacturer=0000
ICEmbeddingDate=0000 (2010-01-01)
ICPrePersonalizer=1220
ICPrePersonalizationEquipmentDate=4F31 (invalid date format)
ICPrePersonalizationEquipmentID=35343434
ICPersonalizer=0000
ICPersonalizationDate=0000 (2010-01-01)
ICPersonalizationEquipmentID=00000000
Card Data:
Tag 6: 1.2.840.114283.1
-> Global Platform card
Tag 60: 1.2.840.114283.2.2.3
-> GP Version: 2.3
Tag 63: 1.2.840.114283.3
Tag 64: 1.2.840.114283.4.2.85
-> GP SCP02 i=55
Tag 65: 1.2.840.114283.5.7.2.0.0
Tag 66: 1.3.6.1.4.1.42.2.110.1.3
-> JavaCard v3
Card Capabilities:
Supports: SCP01 i=05
Supports: SCP02 i=15 i=35 i=55 i=75
Supports: SCP03 i=00 i=10 i=20 i=60 i=70 with AES-128 AES-196 AES-256
Supported DOM privileges: SecurityDomain, DelegatedManagement, CardReset, MandatedDAPVerification, TrustedPath, TokenVerification, GlobalDelete, GlobalLock, GlobalRegistry, FinalApplication, ReceiptGeneration, CipheredLoadFileDataBlock
Supported APP privileges: CardLock, CardTerminate, CardReset, CVMManagement, FinalApplication, GlobalService
Supported LFDB hash: 02
Supported Token Verification ciphers: 7B
Supported Receipt Generation ciphers: 0C
Supported DAP Verification ciphers: 7B
Version: 48 (0x30) ID: 1 (0x01) type: AES length: 16 (AES-128)
Version: 48 (0x30) ID: 2 (0x02) type: AES length: 16 (AES-128)
Version: 48 (0x30) ID: 3 (0x03) type: AES length: 16 (AES-128)
Also, you can try to install GitHub - fidesmo/fdsm: Tiny Fidesmo command line client in Java on your PC and query the internal applet list from the chip using java -jar fdsm.jar --card-apps
. Maybe Fidesmo messed up deleting applets and there are applets left over but not actually instantiated. Example output:
Using card in ACS ACR1252 Dual Reader [ACR1252 Dual Reader PICC] 00 00
# appId - name and vendor
99848a60 - Free Memory (by VivoKey Technologies)
Services: install, destroy
2f2e363b - HMAC-SHA1 Generator (by VivoKey Technologies)
Services: install, destroy
61fc54d5 - OTP Authenticator (by VivoKey Technologies)
Services: destroy, install
cc68e88c - FIDO Security (by VivoKey Technologies)
Services: install_fido2, install_u2f, destroy
In the past, I also had my Android phone to subtly crash the NFC stack, requiring a reboot before anything regarding NFC worked again.