As in matching a pattern in a TCP or UDP payload? Or having a generic pattern for the packet headers?
Perhaps you could try giving an example of what you want to accomplish.
Suricata will send some of the playload as part of the eve json log for the alert.
But it sounds to me like you want full packet capture of just the packets or sessions triggering a Suricata alert.
One way to do that could be post processing of the eve.json and using a secondary tool like stenographer to do the actual packet capturing.