TLDR it's a spyware. It'd be great if someone could perform HTTPS interception to see what kind of data is sent to ads services.
Thank you ETFbitcoin for providing more info,
As I said before in the first post, this can be some sort of malware/spyware.
I know we can use Ollydbg/PEiD/PEBrowse Professional/PE Explorer/Strings v2.53(by Microsoft) in order to track the executable file (.EXE) on windows. Also we can use decompilers and dissemblers to check the assembly codes (lower lever language codes) to find the malware possible patterns.
But unfortunately, I don't have much info about how to analyze the APK files. This could be really nice if someone analyze the APK file and monitor the actions just like what you done here. Much appreciated for it.
HTTPS interception don't require you to analyze the assembly codes or behavior of the application, but only analyze internet connection used by an application by replacing valid HTTPS certificate with our own certificate.
I only know how it works in general and have no idea how to actually do it though.