Nothing here indicates evidence of having been hacked.
If you’re a target for hacking, you need better advice, and direct access for forensic assistance.
If you want to know how iOS works, the New OS X Book series is a good start. Posting “what’s this?” from analytics and from logs is a slow path to this end goal, particularly given ~none of the messages are documented.
Reading and posting text from analytics reports is ~useless, absent specific targets to search for. There’s way too much data, and iOS is always churning along producing more data. Trying to find needles in haystacks, without knowing what the needles look like nor knowing how many haystacks, nor whether there even are any needles. Lots of,work, not all that much for results.
Check my posting history about iPhone hacking, too. It happens. You’l find I do refer to resources and related documentation on previous iOS hacks, including the work of CitizenLab investigating same. Etc.