Create a Custom Threat Signature from a Snort Signature
Convert a third-party signature a custom PAN-OS threat signature.
The following steps illustrate the process for converting a Snort signature into a custom spyware signature compatible with Palo Alto Networks firewalls. The use case below uses a Snort rule for a North Korean Trojan malware variant as identified by the Department of Homeland Security, the Federal Bureau of Investigation, and other US government partners.
With Panorama version 10.0 or later, you can use the IPS Signature Converter plugin to automatically convert Snort and Suricata rules into custom Palo Networks threat signatures instead of manually performing the following procedure.
alert tcp any any -> any any (msg:"Malformed_UA"; content:"User-Agent: Mozillar/"; depth:500; sid:99999999;)
In this example you can:
- Use the IP addresses provided as part of the IOC List to detect if a possible infection already exists by searching the firewall logs.
- The IP addresses provided can be part of an EDL or Address group and added to a Policy to block traffic to and from the suspicious list.
- Use the provided Snort signature and convert it to a custom spyware signature. This signature will become part of the spyware profile added to the appropriate policy.
For other use cases, see our companion article.
- Create a Custom Spyware Object.
- Navigate to.ObjectsCustom ObjectsSpyware/Vulnerability
- ClickAddand provide aThreat ID, an optional comment, and fill out the Properties section.
- UnderSignatures, pressAdd.
- Specify the following information:
- Standard—Enter a name to identify the signature in the field.
- Comment—Enter an optional description.
- If the order in which the firewall attempts to match the signature definitions is important, keepOrdered Condition Matchselected.
- Scope—Indicate whether this signature applies to a fullSessionor a singleTransaction.
- Add a condition by clickingAdd And ConditionorAdd Or Condition.
- Select anOperatorfrom the drop-down menu to define the conditions that must be true for the signature to match traffic.
- If you selectPattern Match, identify aContextin the Snort pattern that matches our available contexts, provide a regular expressionPattern, and optionally,Adda qualifier/value pair. SelectNegateto specify conditions under which the custom signature does not trigger.
- If you selectEqual To,Less Than, orGreater Than, select aContextand enter aValue.
- ClickOKto finish creating the Spyware object.
- Verify that the custom Spyware object is part of your Anti-Spyware Profile.
- Go to. Click an existing profile, then underSecurity ProfilesAnti-SpywareExceptions, search for your signature’s Threat ID andEnableit.
- Create an EDL object.
- Navigate to. ClickObjectsExternal Dynamic ListsAdd.
- Add the suspicious IP address provided from the IOC list to a previously created EDL or a new EDL as shown below.
- Add the EDL and Anti-Spyware profiles to appropriate Policy Objects.
- Test policy is working as expected by looking at Threat logs.
- Change the action for the spyware object from alert to drop/reset after verification. Also, change the severity of the object created as needed.
- Commityour signature(s).
Recommended For You
Recommended videos not found.