Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Fortyseven/aea6eb37ce12d300bb84afc241ed6fad to your computer and use it in GitHub Desktop.
Save Fortyseven/aea6eb37ce12d300bb84afc241ed6fad to your computer and use it in GitHub Desktop.
** TagInfo scan (version 4.24.5) 2020-02-22 18:15:40 **
Report Type: External
-- IC INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
NTAG213
# NFC Forum NDEF-compliant tag:
Type 2 Tag
-- NDEF ------------------------------
# NFC data set information:
NDEF message containing 2 records
Current message size: 120 bytes
Maximum message size: 120 bytes
NFC data set access: Read-Only
# Record #1: URI record:
Type Name Format: NFC Forum well-known type
Short Record
type: "U"
protocol field: https://www.
URI field: pid.mattel/AQBBq-A0AAALAF0tFQAEHl5C8WKB
Payload length: 40 bytes
Payload data:
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB|
[10] 71 2D 41 30 41 41 41 4C 41 46 30 74 46 51 41 45 |q-A0AAALAF0tFQAE|
[20] 48 6C 35 43 38 57 4B 42 |Hl5C8WKB |
# Record #2: Signature record:
Type Name Format: NFC Forum well-known type
Short Record
type: "Sig"
Version: 2.0
Signature type: ECDSA P256
Hash type: SHA-256
Signature data: (64 bytes)
0x02FDF78335FB0DEA641583658833C623
49522AF00B163592E32A0A2E31DADE2A
BFDB7D880DEB1D0FED72E9BB8C98DD08
4FF2EACD997992DF6357BFC668821C49
Certificate chain containing 0 certificates
Certificate type: X.509
Certificate URI:
Error parsing NDEF record
# NDEF message:
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/|
[10] 41 51 42 42 71 2D 41 30 41 41 41 4C 41 46 30 74 |AQBBq-A0AAALAF0t|
[20] 46 51 41 45 48 6C 35 43 38 57 4B 42 51 03 46 53 |FQAEHl5C8WKBQ.FS|
[30] 69 67 20 0B 02 00 40 02 FD F7 83 35 FB 0D EA 64 |ig ...@....5...d|
[40] 15 83 65 88 33 C6 23 49 52 2A F0 0B 16 35 92 E3 |..e.3.#IR*...5..|
[50] 2A 0A 2E 31 DA DE 2A BF DB 7D 88 0D EB 1D 0F ED |*..1..*..}......|
[60] 72 E9 BB 8C 98 DD 08 4F F2 EA CD 99 79 92 DF 63 |r......O....y..c|
[70] 57 BF C6 68 82 1C 49 00 |W..h..I. |
# NDEF Capability Container (CC):
Mapping version: 1.0
Maximum NDEF data size: 144 bytes
NDEF access: Read-Only
E1 10 12 0F |.... |
-- EXTRA ------------------------------
# Memory size:
144 bytes user memory
* 36 pages, with 4 bytes per page
# IC detailed information:
Full product name: NT2H1311G0DUx
Capacitance: 50 pF
# Version information:
Vendor ID: NXP
Type: NTAG
Subtype: 50 pF
Major version: 1
Minor version: V0
Storage size: 144 bytes
Protocol: ISO/IEC 14443-3
# Configuration information:
ASCII mirror disabled
NFC counter: disabled
No limit on wrong password attempts
Strong load modulation disabled
Configuration locked
# Originality check:
Signature verified with NXP public key
-- FULL SCAN ------------------------------
# Technologies supported:
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef]
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms
# Detailed protocol information:
ID: 04:1E:5E:42:F1:62:81
ATQA: 0x4400
SAK: 0x00
# Memory content:
[00] * 04:1E:5E CC (UID0-UID2, BCC0)
[01] * 42:F1:62:81 (UID3-UID6)
[02] * 50 48 FF FF (BCC1, INT, LOCK0-LOCK1)
[03] * E1:10:12:0F (OTP0-OTP3)
[04] * 03 78 91 01 |.x..|
[05] * 28 55 02 70 |(U.p|
[06] * 69 64 2E 6D |id.m|
[07] * 61 74 74 65 |atte|
[08] * 6C 2F 41 51 |l/AQ|
[09] * 42 42 71 2D |BBq-|
[0A] * 41 30 41 41 |A0AA|
[0B] * 41 4C 41 46 |ALAF|
[0C] * 30 74 46 51 |0tFQ|
[0D] * 41 45 48 6C |AEHl|
[0E] * 35 43 38 57 |5C8W|
[0F] * 4B 42 51 03 |KBQ.|
[10] * 46 53 69 67 |FSig|
[11] * 20 0B 02 00 | ...|
[12] * 40 02 FD F7 |@...|
[13] * 83 35 FB 0D |.5..|
[14] * EA 64 15 83 |.d..|
[15] * 65 88 33 C6 |e.3.|
[16] * 23 49 52 2A |#IR*|
[17] * F0 0B 16 35 |...5|
[18] * 92 E3 2A 0A |..*.|
[19] * 2E 31 DA DE |.1..|
[1A] * 2A BF DB 7D |*..}|
[1B] * 88 0D EB 1D |....|
[1C] * 0F ED 72 E9 |..r.|
[1D] * BB 8C 98 DD |....|
[1E] * 08 4F F2 EA |.O..|
[1F] * CD 99 79 92 |..y.|
[20] * DF 63 57 BF |.cW.|
[21] * C6 68 82 1C |.h..|
[22] * 49 00 FE 00 |I...|
[23] * 00 00 00 00 |....|
[24] * 00 00 00 00 |....|
[25] * 00 00 00 00 |....|
[26] * 00 00 00 00 |....|
[27] * 00 00 00 00 |....|
[28] * FF FF FF BD (LOCK2-LOCK4, CHK)
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0)
[2A] * 40 05 -- -- (ACCESS)
[2B] +P FF FF FF FF (PWD0-PWD3)
[2C] +P 00 00 -- -- (PACK0-PACK1)
*:locked & blocked, x:locked,
+:blocked, .:un(b)locked, ?:unknown
r:readable (write-protected),
p:password protected, -:write-only
P:password protected write-only
--------------------------------------
** TagInfo scan (version 4.24.5) 2020-02-22 18:16:40 **
Report Type: External
-- IC INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
NTAG213
# NFC Forum NDEF-compliant tag:
Type 2 Tag
-- NDEF ------------------------------
# NFC data set information:
NDEF message containing 2 records
Current message size: 120 bytes
Maximum message size: 120 bytes
NFC data set access: Read-Only
# Record #1: URI record:
Type Name Format: NFC Forum well-known type
Short Record
type: "U"
protocol field: https://www.
URI field: pid.mattel/AQBBq-BwAAAHAFHvsAMEJsNaK2SB
Payload length: 40 bytes
Payload data:
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB|
[10] 71 2D 42 77 41 41 41 48 41 46 48 76 73 41 4D 45 |q-BwAAAHAFHvsAME|
[20] 4A 73 4E 61 4B 32 53 42 |JsNaK2SB |
# Record #2: Signature record:
Type Name Format: NFC Forum well-known type
Short Record
type: "Sig"
Version: 2.0
Signature type: ECDSA P256
Hash type: SHA-256
Signature data: (64 bytes)
0x15C27FE81C3D8E3D9C1263339A305F79
F3CC7098AF39A22C41CB6003EAABD607
CCFE96AC5F5339C29510028431CF4D10
048263C90C7A91D178F5D6D96608C283
Certificate chain containing 0 certificates
Certificate type: X.509
Certificate URI:
Error parsing NDEF record
# NDEF message:
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/|
[10] 41 51 42 42 71 2D 42 77 41 41 41 48 41 46 48 76 |AQBBq-BwAAAHAFHv|
[20] 73 41 4D 45 4A 73 4E 61 4B 32 53 42 51 03 46 53 |sAMEJsNaK2SBQ.FS|
[30] 69 67 20 0B 02 00 40 15 C2 7F E8 1C 3D 8E 3D 9C |ig ...@.....=.=.|
[40] 12 63 33 9A 30 5F 79 F3 CC 70 98 AF 39 A2 2C 41 |.c3.0_y..p..9.,A|
[50] CB 60 03 EA AB D6 07 CC FE 96 AC 5F 53 39 C2 95 |.`........._S9..|
[60] 10 02 84 31 CF 4D 10 04 82 63 C9 0C 7A 91 D1 78 |...1.M...c..z..x|
[70] F5 D6 D9 66 08 C2 83 00 |...f.... |
# NDEF Capability Container (CC):
Mapping version: 1.0
Maximum NDEF data size: 144 bytes
NDEF access: Read-Only
E1 10 12 0F |.... |
-- EXTRA ------------------------------
# Memory size:
144 bytes user memory
* 36 pages, with 4 bytes per page
# IC detailed information:
Full product name: NT2H1311G0DUx
Capacitance: 50 pF
# Version information:
Vendor ID: NXP
Type: NTAG
Subtype: 50 pF
Major version: 1
Minor version: V0
Storage size: 144 bytes
Protocol: ISO/IEC 14443-3
# Configuration information:
ASCII mirror disabled
NFC counter: disabled
No limit on wrong password attempts
Strong load modulation disabled
Configuration locked
# Originality check:
Signature verified with NXP public key
-- FULL SCAN ------------------------------
# Technologies supported:
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef]
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms
# Detailed protocol information:
ID: 04:26:C3:5A:2B:64:81
ATQA: 0x4400
SAK: 0x00
# Memory content:
[00] * 04:26:C3 69 (UID0-UID2, BCC0)
[01] * 5A:2B:64:81 (UID3-UID6)
[02] * 94 48 FF FF (BCC1, INT, LOCK0-LOCK1)
[03] * E1:10:12:0F (OTP0-OTP3)
[04] * 03 78 91 01 |.x..|
[05] * 28 55 02 70 |(U.p|
[06] * 69 64 2E 6D |id.m|
[07] * 61 74 74 65 |atte|
[08] * 6C 2F 41 51 |l/AQ|
[09] * 42 42 71 2D |BBq-|
[0A] * 42 77 41 41 |BwAA|
[0B] * 41 48 41 46 |AHAF|
[0C] * 48 76 73 41 |HvsA|
[0D] * 4D 45 4A 73 |MEJs|
[0E] * 4E 61 4B 32 |NaK2|
[0F] * 53 42 51 03 |SBQ.|
[10] * 46 53 69 67 |FSig|
[11] * 20 0B 02 00 | ...|
[12] * 40 15 C2 7F |@...|
[13] * E8 1C 3D 8E |..=.|
[14] * 3D 9C 12 63 |=..c|
[15] * 33 9A 30 5F |3.0_|
[16] * 79 F3 CC 70 |y..p|
[17] * 98 AF 39 A2 |..9.|
[18] * 2C 41 CB 60 |,A.`|
[19] * 03 EA AB D6 |....|
[1A] * 07 CC FE 96 |....|
[1B] * AC 5F 53 39 |._S9|
[1C] * C2 95 10 02 |....|
[1D] * 84 31 CF 4D |.1.M|
[1E] * 10 04 82 63 |...c|
[1F] * C9 0C 7A 91 |..z.|
[20] * D1 78 F5 D6 |.x..|
[21] * D9 66 08 C2 |.f..|
[22] * 83 00 FE 00 |....|
[23] * 00 00 00 00 |....|
[24] * 00 00 00 00 |....|
[25] * 00 00 00 00 |....|
[26] * 00 00 00 00 |....|
[27] * 00 00 00 00 |....|
[28] * FF FF FF BD (LOCK2-LOCK4, CHK)
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0)
[2A] * 40 05 -- -- (ACCESS)
[2B] +P FF FF FF FF (PWD0-PWD3)
[2C] +P 00 00 -- -- (PACK0-PACK1)
*:locked & blocked, x:locked,
+:blocked, .:un(b)locked, ?:unknown
r:readable (write-protected),
p:password protected, -:write-only
P:password protected write-only
--------------------------------------
** TagInfo scan (version 4.24.5) 2020-02-22 18:17:20 **
Report Type: External
-- IC INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
NTAG213
# NFC Forum NDEF-compliant tag:
Type 2 Tag
-- NDEF ------------------------------
# NFC data set information:
NDEF message containing 2 records
Current message size: 120 bytes
Maximum message size: 120 bytes
NFC data set access: Read-Only
# Record #1: URI record:
Type Name Format: NFC Forum well-known type
Short Record
type: "U"
protocol field: https://www.
URI field: pid.mattel/AQBBq-BTAAAEAF06o-8EfpBSK2SA
Payload length: 40 bytes
Payload data:
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB|
[10] 71 2D 42 54 41 41 41 45 41 46 30 36 6F 2D 38 45 |q-BTAAAEAF06o-8E|
[20] 66 70 42 53 4B 32 53 41 |fpBSK2SA |
# Record #2: Signature record:
Type Name Format: NFC Forum well-known type
Short Record
type: "Sig"
Version: 2.0
Signature type: ECDSA P256
Hash type: SHA-256
Signature data: (64 bytes)
0xBBE4BA7DF8BAAD953AB84D50093EA2B2
96FF801D40B7F4D15B0BB6963522D7E8
16D11924EE5912959FCEDAF4141E09CF
AE09A0EB2861EFF785D9793FA9E5A7C5
Certificate chain containing 0 certificates
Certificate type: X.509
Certificate URI:
Error parsing NDEF record
# NDEF message:
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/|
[10] 41 51 42 42 71 2D 42 54 41 41 41 45 41 46 30 36 |AQBBq-BTAAAEAF06|
[20] 6F 2D 38 45 66 70 42 53 4B 32 53 41 51 03 46 53 |o-8EfpBSK2SAQ.FS|
[30] 69 67 20 0B 02 00 40 BB E4 BA 7D F8 BA AD 95 3A |ig ...@...}....:|
[40] B8 4D 50 09 3E A2 B2 96 FF 80 1D 40 B7 F4 D1 5B |.MP.>......@...[|
[50] 0B B6 96 35 22 D7 E8 16 D1 19 24 EE 59 12 95 9F |...5".....$.Y...|
[60] CE DA F4 14 1E 09 CF AE 09 A0 EB 28 61 EF F7 85 |...........(a...|
[70] D9 79 3F A9 E5 A7 C5 00 |.y?..... |
# NDEF Capability Container (CC):
Mapping version: 1.0
Maximum NDEF data size: 144 bytes
NDEF access: Read-Only
E1 10 12 0F |.... |
-- EXTRA ------------------------------
# Memory size:
144 bytes user memory
* 36 pages, with 4 bytes per page
# IC detailed information:
Full product name: NT2H1311G0DUx
Capacitance: 50 pF
# Version information:
Vendor ID: NXP
Type: NTAG
Subtype: 50 pF
Major version: 1
Minor version: V0
Storage size: 144 bytes
Protocol: ISO/IEC 14443-3
# Configuration information:
ASCII mirror disabled
NFC counter: disabled
No limit on wrong password attempts
Strong load modulation disabled
Configuration locked
# Originality check:
Signature verified with NXP public key
-- FULL SCAN ------------------------------
# Technologies supported:
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef]
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms
# Detailed protocol information:
ID: 04:7E:90:52:2B:64:80
ATQA: 0x4400
SAK: 0x00
# Memory content:
[00] * 04:7E:90 62 (UID0-UID2, BCC0)
[01] * 52:2B:64:80 (UID3-UID6)
[02] * 9D 48 FF FF (BCC1, INT, LOCK0-LOCK1)
[03] * E1:10:12:0F (OTP0-OTP3)
[04] * 03 78 91 01 |.x..|
[05] * 28 55 02 70 |(U.p|
[06] * 69 64 2E 6D |id.m|
[07] * 61 74 74 65 |atte|
[08] * 6C 2F 41 51 |l/AQ|
[09] * 42 42 71 2D |BBq-|
[0A] * 42 54 41 41 |BTAA|
[0B] * 41 45 41 46 |AEAF|
[0C] * 30 36 6F 2D |06o-|
[0D] * 38 45 66 70 |8Efp|
[0E] * 42 53 4B 32 |BSK2|
[0F] * 53 41 51 03 |SAQ.|
[10] * 46 53 69 67 |FSig|
[11] * 20 0B 02 00 | ...|
[12] * 40 BB E4 BA |@...|
[13] * 7D F8 BA AD |}...|
[14] * 95 3A B8 4D |.:.M|
[15] * 50 09 3E A2 |P.>.|
[16] * B2 96 FF 80 |....|
[17] * 1D 40 B7 F4 |.@..|
[18] * D1 5B 0B B6 |.[..|
[19] * 96 35 22 D7 |.5".|
[1A] * E8 16 D1 19 |....|
[1B] * 24 EE 59 12 |$.Y.|
[1C] * 95 9F CE DA |....|
[1D] * F4 14 1E 09 |....|
[1E] * CF AE 09 A0 |....|
[1F] * EB 28 61 EF |.(a.|
[20] * F7 85 D9 79 |...y|
[21] * 3F A9 E5 A7 |?...|
[22] * C5 00 FE 00 |....|
[23] * 00 00 00 00 |....|
[24] * 00 00 00 00 |....|
[25] * 00 00 00 00 |....|
[26] * 00 00 00 00 |....|
[27] * 00 00 00 00 |....|
[28] * FF FF FF BD (LOCK2-LOCK4, CHK)
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0)
[2A] * 40 05 -- -- (ACCESS)
[2B] +P FF FF FF FF (PWD0-PWD3)
[2C] +P 00 00 -- -- (PACK0-PACK1)
*:locked & blocked, x:locked,
+:blocked, .:un(b)locked, ?:unknown
r:readable (write-protected),
p:password protected, -:write-only
P:password protected write-only
--------------------------------------
** TagInfo scan (version 4.24.5) 2020-02-22 18:17:48 **
Report Type: External
-- IC INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
MIFARE Ultralight (unknown type) (MF0ICU1)
# NFC Forum NDEF-compliant tag:
Type 2 Tag
-- NDEF ------------------------------
# NFC data set information:
NDEF message containing 2 records
Current message size: 120 bytes
Maximum message size: 120 bytes
NFC data set access: Read-Only
# Record #1: URI record:
Type Name Format: NFC Forum well-known type
Short Record
type: "U"
protocol field: https://www.
URI field: pid.mattel/AQBBq-BTAAAEAF06o-8EfpBSK2SA
Payload length: 40 bytes
Payload data:
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB|
[10] 71 2D 42 54 41 41 41 45 41 46 30 36 6F 2D 38 45 |q-BTAAAEAF06o-8E|
[20] 66 70 42 53 4B 32 53 41 |fpBSK2SA |
# Record #2: Signature record:
Type Name Format: NFC Forum well-known type
Short Record
type: "Sig"
Version: 2.0
Signature type: ECDSA P256
Hash type: SHA-256
Signature data: (64 bytes)
0xBBE4BA7DF8BAAD953AB84D50093EA2B2
96FF801D40B7F4D15B0BB6963522D7E8
16D11924EE5912959FCEDAF4141E09CF
AE09A0EB2861EFF785D9793FA9E5A7C5
Certificate chain containing 0 certificates
Certificate type: X.509
Certificate URI:
Error parsing NDEF record
# NDEF message:
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/|
[10] 41 51 42 42 71 2D 42 54 41 41 41 45 41 46 30 36 |AQBBq-BTAAAEAF06|
[20] 6F 2D 38 45 66 70 42 53 4B 32 53 41 51 03 46 53 |o-8EfpBSK2SAQ.FS|
[30] 69 67 20 0B 02 00 40 BB E4 BA 7D F8 BA AD 95 3A |ig ...@...}....:|
[40] B8 4D 50 09 3E A2 B2 96 FF 80 1D 40 B7 F4 D1 5B |.MP.>......@...[|
[50] 0B B6 96 35 22 D7 E8 16 D1 19 24 EE 59 12 95 9F |...5".....$.Y...|
[60] CE DA F4 14 1E 09 CF AE 09 A0 EB 28 61 EF F7 85 |...........(a...|
[70] D9 79 3F A9 E5 A7 C5 00 |.y?..... |
# NDEF Capability Container (CC):
Mapping version: 1.0
Maximum NDEF data size: 144 bytes
NDEF access: Read-Only
E1 10 12 0F |.... |
-- EXTRA ------------------------------
# Memory information:
64 bytes total memory
* 16 pages, with 4 bytes per page
* 48 bytes user memory (12 pages)
Memory is locked
-- FULL SCAN ------------------------------
--------------------------------------
** TagInfo scan (version 4.24.5) 2020-02-22 18:18:19 **
Report Type: External
-- IC INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
NTAG213
# NFC Forum NDEF-compliant tag:
Type 2 Tag
-- NDEF ------------------------------
# NFC data set information:
NDEF message containing 2 records
Current message size: 120 bytes
Maximum message size: 120 bytes
NFC data set access: Read-Only
# Record #1: URI record:
Type Name Format: NFC Forum well-known type
Short Record
type: "U"
protocol field: https://www.
URI field: pid.mattel/AQBBq-BTAAAEAF06o-8EfpBSK2SA
Payload length: 40 bytes
Payload data:
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB|
[10] 71 2D 42 54 41 41 41 45 41 46 30 36 6F 2D 38 45 |q-BTAAAEAF06o-8E|
[20] 66 70 42 53 4B 32 53 41 |fpBSK2SA |
# Record #2: Signature record:
Type Name Format: NFC Forum well-known type
Short Record
type: "Sig"
Version: 2.0
Signature type: ECDSA P256
Hash type: SHA-256
Signature data: (64 bytes)
0xBBE4BA7DF8BAAD953AB84D50093EA2B2
96FF801D40B7F4D15B0BB6963522D7E8
16D11924EE5912959FCEDAF4141E09CF
AE09A0EB2861EFF785D9793FA9E5A7C5
Certificate chain containing 0 certificates
Certificate type: X.509
Certificate URI:
Error parsing NDEF record
# NDEF message:
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/|
[10] 41 51 42 42 71 2D 42 54 41 41 41 45 41 46 30 36 |AQBBq-BTAAAEAF06|
[20] 6F 2D 38 45 66 70 42 53 4B 32 53 41 51 03 46 53 |o-8EfpBSK2SAQ.FS|
[30] 69 67 20 0B 02 00 40 BB E4 BA 7D F8 BA AD 95 3A |ig ...@...}....:|
[40] B8 4D 50 09 3E A2 B2 96 FF 80 1D 40 B7 F4 D1 5B |.MP.>......@...[|
[50] 0B B6 96 35 22 D7 E8 16 D1 19 24 EE 59 12 95 9F |...5".....$.Y...|
[60] CE DA F4 14 1E 09 CF AE 09 A0 EB 28 61 EF F7 85 |...........(a...|
[70] D9 79 3F A9 E5 A7 C5 00 |.y?..... |
# NDEF Capability Container (CC):
Mapping version: 1.0
Maximum NDEF data size: 144 bytes
NDEF access: Read-Only
E1 10 12 0F |.... |
-- EXTRA ------------------------------
# Memory size:
144 bytes user memory
* 36 pages, with 4 bytes per page
# IC detailed information:
Full product name: NT2H1311G0DUx
Capacitance: 50 pF
# Version information:
Vendor ID: NXP
Type: NTAG
Subtype: 50 pF
Major version: 1
Minor version: V0
Storage size: 144 bytes
Protocol: ISO/IEC 14443-3
# Configuration information:
ASCII mirror disabled
NFC counter: disabled
No limit on wrong password attempts
Strong load modulation disabled
Configuration locked
# Originality check:
Signature verified with NXP public key
-- FULL SCAN ------------------------------
# Technologies supported:
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef]
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms
# Detailed protocol information:
ID: 04:7E:90:52:2B:64:80
ATQA: 0x4400
SAK: 0x00
# Memory content:
[00] * 04:7E:90 62 (UID0-UID2, BCC0)
[01] * 52:2B:64:80 (UID3-UID6)
[02] * 9D 48 FF FF (BCC1, INT, LOCK0-LOCK1)
[03] * E1:10:12:0F (OTP0-OTP3)
[04] * 03 78 91 01 |.x..|
[05] * 28 55 02 70 |(U.p|
[06] * 69 64 2E 6D |id.m|
[07] * 61 74 74 65 |atte|
[08] * 6C 2F 41 51 |l/AQ|
[09] * 42 42 71 2D |BBq-|
[0A] * 42 54 41 41 |BTAA|
[0B] * 41 45 41 46 |AEAF|
[0C] * 30 36 6F 2D |06o-|
[0D] * 38 45 66 70 |8Efp|
[0E] * 42 53 4B 32 |BSK2|
[0F] * 53 41 51 03 |SAQ.|
[10] * 46 53 69 67 |FSig|
[11] * 20 0B 02 00 | ...|
[12] * 40 BB E4 BA |@...|
[13] * 7D F8 BA AD |}...|
[14] * 95 3A B8 4D |.:.M|
[15] * 50 09 3E A2 |P.>.|
[16] * B2 96 FF 80 |....|
[17] * 1D 40 B7 F4 |.@..|
[18] * D1 5B 0B B6 |.[..|
[19] * 96 35 22 D7 |.5".|
[1A] * E8 16 D1 19 |....|
[1B] * 24 EE 59 12 |$.Y.|
[1C] * 95 9F CE DA |....|
[1D] * F4 14 1E 09 |....|
[1E] * CF AE 09 A0 |....|
[1F] * EB 28 61 EF |.(a.|
[20] * F7 85 D9 79 |...y|
[21] * 3F A9 E5 A7 |?...|
[22] * C5 00 FE 00 |....|
[23] * 00 00 00 00 |....|
[24] * 00 00 00 00 |....|
[25] * 00 00 00 00 |....|
[26] * 00 00 00 00 |....|
[27] * 00 00 00 00 |....|
[28] * FF FF FF BD (LOCK2-LOCK4, CHK)
[29] * 28 55 02 70 (CFG, MIRROR, AUTH0)
[2A] * 40 05 -- -- (ACCESS)
[2B] +P FF FF FF FF (PWD0-PWD3)
[2C] +P 00 00 -- -- (PACK0-PACK1)
*:locked & blocked, x:locked,
+:blocked, .:un(b)locked, ?:unknown
r:readable (write-protected),
p:password protected, -:write-only
P:password protected write-only
--------------------------------------
** TagInfo scan (version 4.24.5) 2020-02-22 18:17:06 **
Report Type: External
-- IC INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
NTAG213
# NFC Forum NDEF-compliant tag:
Type 2 Tag
-- NDEF ------------------------------
# NFC data set information:
NDEF message containing 2 records
Current message size: 120 bytes
Maximum message size: 120 bytes
NFC data set access: Read-Only
# Record #1: URI record:
Type Name Format: NFC Forum well-known type
Short Record
type: "U"
protocol field: https://www.
URI field: pid.mattel/AQBBq-B0AAAEAF041M8E872Ke2OA
Payload length: 40 bytes
Payload data:
[00] 02 70 69 64 2E 6D 61 74 74 65 6C 2F 41 51 42 42 |.pid.mattel/AQBB|
[10] 71 2D 42 30 41 41 41 45 41 46 30 34 31 4D 38 45 |q-B0AAAEAF041M8E|
[20] 38 37 32 4B 65 32 4F 41 |872Ke2OA |
# Record #2: Signature record:
Type Name Format: NFC Forum well-known type
Short Record
type: "Sig"
Version: 2.0
Signature type: ECDSA P256
Hash type: SHA-256
Signature data: (64 bytes)
0xCE77B63A9AA1AC70EF7BFF6758305D39
063597E80AA006FCC7C9E0076B0F91D5
9B316157B07DA2A201BD948860E8A5D4
063F165CEA6E416733A0BCA45A464FF6
Certificate chain containing 0 certificates
Certificate type: X.509
Certificate URI:
Error parsing NDEF record
# NDEF message:
[00] 91 01 28 55 02 70 69 64 2E 6D 61 74 74 65 6C 2F |..(U.pid.mattel/|
[10] 41 51 42 42 71 2D 42 30 41 41 41 45 41 46 30 34 |AQBBq-B0AAAEAF04|
[20] 31 4D 38 45 38 37 32 4B 65 32 4F 41 51 03 46 53 |1M8E872Ke2OAQ.FS|
[30] 69 67 20 0B 02 00 40 CE 77 B6 3A 9A A1 AC 70 EF |ig ...@.w.:...p.|
[40] 7B FF 67 58 30 5D 39 06 35 97 E8 0A A0 06 FC C7 |{.gX0]9.5.......|
[50] C9 E0 07 6B 0F 91 D5 9B 31 61 57 B0 7D A2 A2 01 |...k....1aW.}...|
[60] BD 94 88 60 E8 A5 D4 06 3F 16 5C EA 6E 41 67 33 |...`....?.\.nAg3|
[70] A0 BC A4 5A 46 4F F6 00 |...ZFO.. |
-- EXTRA ------------------------------
# Memory size:
144 bytes user memory
* 36 pages, with 4 bytes per page
# IC detailed information:
Full product name: NT2H1311G0DUx
Capacitance: 50 pF
# Version information:
Vendor ID: NXP
Type: NTAG
Subtype: 50 pF
Major version: 1
Minor version: V0
Storage size: 144 bytes
Protocol: ISO/IEC 14443-3
# Originality check:
Signature verified with NXP public key
-- FULL SCAN ------------------------------
# Technologies supported:
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.Ndef]
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms
# Detailed protocol information:
ID: 04:F3:BD:8A:7B:63:80
ATQA: 0x4400
SAK: 0x00
--------------------------------------
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment