From: Nicola Hogg [NHogg@pettywood.co.uk]There is no body text, but instead there is an attachment PS007XX20000584 - Confirmation with Photos.DOC which has a VirusTotal detection rate of 5/55 and it contains a malicious macro [pastebin] which (according to this Malwr report) downloads a binary from:
Date: 15 December 2015 at 10:14
Subject: Order PS007XX20000584
There are probably other version of the document with different download locations. This malicious executable has a detection rate of 2/54 and between them these three reports    indicate malicious traffic to:
220.127.116.11 (Megawire Inc, Canada)
18.104.22.168 (Ho Chi Minh City Post And Telecom Company, Vietnam)
The payload here is likely to be the Dridex banking trojan.