Hi Pancakes,
First, please note that I don't have any experience with Endace cards. Most of our users use standard non-accelerated Ethernet adapters and most folks report good results with Intel cards:
I know that's not what you want to hear, so let's discuss Endace cards a little more :)
It sounds like James is correct that you could recompile Snort/Suricata against the Endace libraries and add the Bro plugin. However, I'm not sure netsniff-ng could be made to work as it does not use libpcap. So you wouldn't have full packet capture unless you reconfigured our scripts to use Suricata to write full packet capture. At that point, recompiling binaries and rewriting scripts would be significantly re-engineering Security Onion and I'm not sure that's the best solution.
Here's another potential idea, although it's a pretty ugly hack and I don't know if it would even work. If Snort can be compiled against the Endace libraries, then in theory you should be able to compile daemonlogger against the Endace libraries as well, since daemonlogger is essentially Snort without the IDS code. Daemonlogger can act as a "soft tap", collecting traffic from one interface and then forwarding to another. So if you could compile daemonlogger against the Endace libraries, configure it to consume traffic from the Endace card and forward that traffic to a standard ethernet interface, then our standard Snort/Suricata/Bro/netsniff-ng stack might be able to take it from there. Again, I must emphasize that this is a quick and dirty hack and I have no idea if it would actually work.
Please let us know if you have further questions.
Thanks!