Good stuff. You might find more interesting data by implementing Frida [0] into your process to snoop on encrypted traffic normally not visible due to pinned certificates.

[0] https://frida.re/docs/home/

And more specifically just use the maintained scripts from HTTP Toolkit.

https://github.com/httptoolkit/frida-interception-and-unpinn...

Excellent, thank you. There’s a lot to Frida.

HTTP Toolkit only mentions using jailbroken iOS devices, but you can also use unjailbroken devices running v13+ via injection [0]

[0] https://frida.re/docs/ios/