2021/01/21 22:57:29 512FD6F4 r (reader) MYCARD [mouse] Card type: T3VV
2021/01/21 22:57:29 512FD6F4 r (reader) MYCARD [mouse] Rom version: 20C2
2021/01/21 22:59:40 652C82AC c (ecm) aaa (09BF@000000/02D0/0976/5E:49BBFCC726A062EAD682AC17488A0BFA:0F06000120000000): not found (369 ms) by MYCARD (lg)
2021/01/21 22:57:29 512FD6F4 r (reader) MYCARD [mouse] Card type: T3VV
2021/01/21 22:57:29 512FD6F4 r (reader) MYCARD [mouse] Rom version: 20C2
2021/01/21 22:59:40 652C82AC c (ecm) aaa (09BF@000000/02D0/0976/5E:49BBFCC726A062EAD682AC17488A0BFA:0F06000120000000): not found (369 ms) by MYCARD (lg)
No i mean your card is entirely different type and can only be opened by stb hack and not bruteforce. Clear now?
V13 , V14, V15 is unique description of german cards printed on the card itself, has nothing to do with general nds version.
Show us Your Card Start Log and ATR inside
looks like this Card is not Implemented in Oscam so dont think that it will help just to Put Ins and Boxid inside
Settings in Oscam 2+4 and let us show The Log on any Channel too