How EMV Foundry Works

Cloned Boy

Professional
Messages
723
Reaction score
533
Points
93
EMV Foundry is a specialized software designed to work with EMV (Europay, Mastercard, and Visa) cards. It allows users to interact with card chips, extract and edit data, and program cards for various use cases.

EMV Foundry Key Features​

  1. Reading card data:
    • EMV Foundry allows you to connect to EMV cards via card readers and extract information such as ATR (Answer to Reset), application data, encryption keys and other parameters.
    • The user can view the data in a convenient format, which simplifies analysis and modification.
  2. Editing card data:
    • The software provides tools to edit data such as Primary Account Number (PAN), expiration date, service code and other parameters.
    • This can be useful for customizing cards in test scenarios or for development.
  3. Creating and writing IST files:
    • EMV Foundry allows you to create IST (Integrated Circuit Card Specification) files, which contain the card configuration and the data needed to program it.
    • Users can write data to cards using card readers, which is important for creating test cards.
  4. Analysis and debugging:
    • EMV Foundry provides tools to analyze card and application performance to identify and correct errors.
    • Debugging features are available to help developers test their cards and applications.

How to Use EMV Foundry: Step-by-Step Guide​

1. Installation and configuration​

  • Install EMV Foundry on your computer and connect your card reader.
  • Make sure the drivers for your card reader are installed correctly.

2. Reading the card​

  • Insert the EMV card into the card reader.
  • Open EMV Foundry and select the option to read the card.
  • The software will extract the ATR and other data which will be displayed on the screen.

3. Changing data​

  • Go to the card editing section.
  • Make any necessary changes such as PAN, expiry date or other details.
  • Please ensure that all changes are correct and comply with EMV requirements.

4. Creating an IST file​

  • After editing the data, create an IST file.
  • Save the file on your computer for future use.

5. Writing data to the card​

  • Select the option to write data to EMV Foundry.
  • Download the IST file and follow the instructions to burn to the card.
  • Make sure the recording process is completed successfully.

6. Testing and verification​

  • Use tools like Cardpeek to check the data on the card after burning.
  • Make sure all data is correct and the card is functioning as expected.

Conclusion​

EMV Foundry is a powerful EMV card tool that offers read, edit, and write capabilities. Understanding how this software works can be useful in the context of cybersecurity and application development, but it is always important to adhere to ethical standards and laws.
 

How does EMV Foundry work? (Overview for educational purposes)​

EMV Foundry is a professional tool for analyzing, emulating and testing EMV cards (bank, transport, SIM cards). It is used by payment system developers, pentesters and security researchers for legal study of EMV protocols, as well as by carders in offline carding for cloning cards.

1. EMV Foundry Key Features​

1.1 Reading EMV card data​

  • ATR (Answer To Reset) — identification of the card type.
  • Application ID list (AID) - for example, VISA PayWave, Mastercard PayPass.
  • Static data (IST) - PAN, expiration date, service code.
  • Dynamic data (ARQC, ARPC, TC) - cryptograms for online transactions.
Example:
Code:
Application: VISA (AID: A0 00 00 00 03 10 10)
PAN: 4**5 1234567890
Expiry: 12/25
Service Code: 201 (International Credit)

1.2 Card emulation​

  • It is possible to create a virtual EMV card with custom data (for testing terminals).
  • Downloading IST files (ICC Static Data) for offline transactions.

1.3 Transaction generation​

  • Emulation of contact (T=0/T=1) and contactless (NFC) transactions.
  • Analysis of cryptograms (ARQC, TC, AAC) to study authentication mechanisms.

1.4 Working with APDU commands​

  • Manually sending commands (e.g. SELECT PPSE, GET PROCESSING OPTIONS).
  • Decoding card responses (TLV format).
Example APDU:
Code:
-> 00 A4 04 00 0E 32 50 41 59 2E 53 59 53 2E 44 44 46 30 31 00  
<- 6F 1A 84 0E 32 50... (card answer)

2. Typical use case​

2.1 Analysis of a real card (legally!)​

  1. Connect the card via the reader (ACR122U, Omnikey).
  2. В EMV Foundry:
    • Read the ATR to identify the card.
    • Select an application (eg VISA).
    • Extract data: PAN, expiry, track2.

2.2 Testing the terminal​

  1. Create a virtual card with test data.
  2. Emulate a transaction:
    • The terminal sends GPO (Get Processing Options).
    • EMV Foundry generates ARQC/TC.

2.3 Vulnerability Research​

  • Offline attacks: Substitution of IST files (on cloned cards).
  • MITM attacks: Analysis of data exchange between the card and the terminal.

3. Alternatives for Research​

  • PyResMan (Open-source EMV analyzer).
  • CardPeek (Free Smart Card Reader).
  • QEMU + EMV emulation (For deep learning of protocols).

Conclusion​

EMV Foundry is a powerful tool for securely exploring EMV technologies, but its use requires strict ethical and legal guidelines. If you are investigating payment system vulnerabilities, only work with test cards and in a controlled environment.
EMV Foundry does not hack cards - it is a tool for analyzing legitimate test data.

Need details on specific APDU commands or IST emulation? Specify the task!
 
EMV Foundry is a non-standard or third-party resource that is likely used to store and analyze data about EMV cards (e.g. payment, SIM, smart cards). It may contain a database of ATR (Answer To Reset), file structures, APDU commands, and other parameters related to cards. Below is a description of how such tools typically work, with an emphasis on educational and ethical considerations.

How does EMV Foundry work?​

  1. ATR Database:
    • Stores unique ATRs for different card types. ATR is the first response of the card during initialization, defining protocols (T=0, T=1), data transfer rates and other parameters.
    • Example ATR: 3B 6F 00 FF 00 00 11 00 6E 01 02 02 22 02 81 02 80.
  2. File structure of the card:
    • Describes a hierarchy of files (MF, DF, EF), as in the ISO/IEC 7816 standard. For example:
      • MF (Master File) - root directory.
      • DF (Dedicated File) — subdirectories (for example, 3F00 for the file "Payment").
      • EF (Elementary File) - data (e.g. balance, transaction history).
  3. Template APDU command:
    • Contains examples of commands for interacting with the card (e.g. SELECT FILE, READ RECORD).
  4. Data Analysis:
    • Allows users to compare the ATR of their cards with known samples, identify chips and predict possible vulnerabilities.

How do users interact with EMV Foundry?​

  1. ATR Search:
    • The user enters the ATR of his card (obtained via Cardpeek, pcsc_scan, etc.) and the system tries to find matches.
    • Example use case: If your card returns ATR 3B8F80018031FE454A434F50..., EMV Foundry can show that it is a payment card with a JCOP chip.
  2. Exploring the file system:
    • For the found ATR, file schemes and data are provided (e.g. EMV structure for Visa/Mastercard).
  3. Testing with Cardpeek:
    • Users import ATR from EMV Foundry into tools like Cardpeek for card analysis.

Example of use (for training)​

  1. Getting ATR:
    • Insert the card into the reader and use Cardpeek or pcsc_scan to get the ATR.
    • Example output:
      Code:
      ATR: 3B 6F 00 FF 00 00 11 00 6E 01 02 02 22 02 81 02 80
  2. Search in EMV Foundry:
    • Enter ATR into EMV Foundry. If a match is found:
      • Find out the card type (for example, Visa PayWave).
      • Get the file scheme (eg 3F00 → A000000003 → B001).
  3. Analysis in Cardpeek:
    • Add ATR to Cardpeek (Tools > ATR Tool > Custom) and connect the card.
    • Cardpeek will display files and data (if access is allowed).

Important Warnings​

  1. Third-party resource restrictions:
    • EMV Foundry and similar platforms are not official. Their data may be incomplete or outdated.
    • For reliable information, please refer to EMVCo (the official EMV standard).
  2. Security risks:
    • Some resources may contain instructions for exploiting vulnerabilities (for example, old Mifare Classic cards).

Conclusion​

EMV Foundry (if it exists) is most likely a tool for researchers to help analyze smart cards for educational purposes. Its use requires an understanding of EMV standards, working with APDU commands, and ethical practices. For safe learning, it is recommended to use programmable cards (e.g. with JavaCard chips) or simulators (vsmartcard).
Focus on open source projects (e.g. NXP JCOP, OpenEMV) or cards that you have programmed yourself.
 
Top