Reply To: Native commands sending to MiFARE DESFire EV1

Forum MIFARE SDK Native commands sending to MiFARE DESFire EV1 Reply To: Native commands sending to MiFARE DESFire EV1

Re: Native commands sending to MiFARE DESFire EV1

16. May 2018 at 15:31
Hi Neel,

The DESFire native datasheet is NDA classified. But you can do a lot with the public ISO commands:

– INS code ‘A4’ SELECT
– INS code ‘B0’ READ BINARY
– INS code ‘D6’ UPDATE BINARY
– INS code ‘B2’ READ RECORDS
– INS code ‘E2’ APPEND RECORD
– INS code ‘84’ GET CHALLENGE
– INS code ‘88’ INTERNAL AUTHENTICATE
– INS code ‘82’ EXTERNAL AUTHENTICATE


You will find the information here:

https://www.nxp.com/docs/en/data-sheet/MF3ICDX21_41_81_SDS.pdf

The TapLinx team
+ 0  |  - 0